Date: Fri, 22 Dec 2023 18:21:24 -0800
Subject: [PATCH 3/7] Reviewed applocker articles for accuracy and fixed
Acrolinx and readability issues.
---
.../applocker-policies-deployment-guide.md | 51 ++++++--------
.../create-your-applocker-policies.md | 41 +++++------
.../applocker/create-your-applocker-rules.md | 70 +++++++++----------
...oy-the-applocker-policy-into-production.md | 35 +++++-----
...ements-for-deploying-applocker-policies.md | 61 ++++++++--------
...the-applocker-policy-deployment-process.md | 21 +++---
...-create-and-maintain-applocker-policies.md | 66 +++++++++--------
7 files changed, 160 insertions(+), 185 deletions(-)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md
index 3e609e4176..c6e633f5be 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md
@@ -1,47 +1,38 @@
---
title: AppLocker deployment guide
-description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
+description: This article for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/22/2023
---
# AppLocker deployment guide
-> [!NOTE]
-> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
-This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
-
-This guide provides steps based on your design and planning investigation for deploying application control policies by using AppLocker. It's intended for security architects, security administrators, and system administrators. Through a sequential and iterative deployment process, you can create application control policies, test and adjust the policies, and implement a method for maintaining those policies as the needs in your organization change.
-
-This guide covers the use of Software Restriction Policies (SRP) in conjunction with AppLocker policies to control application usage. For a comparison of SRP and AppLocker, see [Using Software Restriction Policies and AppLocker policies](using-software-restriction-policies-and-applocker-policies.md) in this guide. To understand if AppLocker is the correct application control solution for you, see [Understand AppLocker policy design decisions](understand-applocker-policy-design-decisions.md).
+This guide provides steps based on your design and planning investigation for deploying application control policies by using AppLocker. By creating, testing, and maintaining your application control policies through a sequential and iterative deployment process, you can adapt to the changing needs of your organization.
## Prerequisites to deploying AppLocker policies
The following are prerequisites or recommendations to deploying policies:
-- Understand the capabilities of AppLocker:
- - [AppLocker](applocker-overview.md)
-- Document your application control policy deployment plan by addressing these tasks:
- - [Understand the AppLocker policy deployment process](understand-the-applocker-policy-deployment-process.md)
- - [Understand AppLocker policy design decisions](understand-applocker-policy-design-decisions.md)
- - [Determine your application control objectives](determine-your-application-control-objectives.md)
- - [Create list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md)
- - [Select types of rules to create](select-types-of-rules-to-create.md)
- - [Determine Group Policy Structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md)
- - [Plan for AppLocker policy management](plan-for-applocker-policy-management.md)
-
-## Contents of this guide
-
-This guide provides steps based on your design and planning investigation for deploying application control policies created and maintained by AppLocker for computers running any of the supported versions of Windows listed in [Requirements to use AppLocker](requirements-to-use-applocker.md).
+- Understand the capabilities of AppLocker:
+ - [AppLocker](applocker-overview.md)
+- Document your application control policy deployment plan by addressing these tasks:
+ - [Understand the AppLocker policy deployment process](understand-the-applocker-policy-deployment-process.md)
+ - [Understand AppLocker policy design decisions](understand-applocker-policy-design-decisions.md)
+ - [Determine your application control objectives](determine-your-application-control-objectives.md)
+ - [Create list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md)
+ - [Select types of rules to create](select-types-of-rules-to-create.md)
+ - [Determine Group Policy Structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md)
+ - [Plan for AppLocker policy management](plan-for-applocker-policy-management.md)
## In this section
-| Topic | Description |
-| - | - |
-| [Understand the AppLocker policy deployment process](understand-the-applocker-policy-deployment-process.md) | This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies. |
-| [Requirements for Deploying AppLocker Policies](requirements-for-deploying-applocker-policies.md) | This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies. |
-| [Use Software Restriction Policies and AppLocker policies](using-software-restriction-policies-and-applocker-policies.md) | This topic for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment. |
-| [Create Your AppLocker policies](create-your-applocker-policies.md) | This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment. |
-| [Deploy the AppLocker policy into production](deploy-the-applocker-policy-into-production.md) | This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings. |
+| Article | Description |
+| --- | --- |
+| [Understand the AppLocker policy deployment process](understand-the-applocker-policy-deployment-process.md) | This planning and deployment article for the IT professional describes the process for using AppLocker when deploying application control policies. |
+| [Requirements for Deploying AppLocker Policies](requirements-for-deploying-applocker-policies.md) | This deployment article for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies. |
+| [Use Software Restriction Policies and AppLocker policies](using-software-restriction-policies-and-applocker-policies.md) | This article for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment. |
+| [Create Your AppLocker policies](create-your-applocker-policies.md) | This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment. |
+| [Deploy the AppLocker policy into production](deploy-the-applocker-policy-into-production.md) | This article for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings. |
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-policies.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-policies.md
index 861bf58502..1b14478169 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-policies.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-policies.md
@@ -1,40 +1,36 @@
---
title: Create Your AppLocker policies
-description: This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
+description: This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/22/2023
---
# Create Your AppLocker policies
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
-This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
-
-Creating effective application control policies with AppLocker starts by creating the rules for each app. Rules are grouped into one of five rule collections. The rule collection can be configured to be enforced or to run in **Audit only** mode. An AppLocker policy includes the rules in the five rule collections and the enforcement settings for each rule collection.
+Creating effective application control policies with AppLocker starts by creating the rules for each app. Rules are grouped into one of five rule collections. The rule collection is configured to enforce or to audit only. An AppLocker policy includes the rules in the five rule collections and the enforcement mode settings for each rule collection.
## Step 1: Use your plan
-You can develop an application control policy plan to guide you in making successful deployment decisions. For more information about how to develop this policy and what you should consider, see the [AppLocker Design Guide](applocker-policies-design-guide.md). This guide is intended for security architects, security administrators, and system administrators. It contains the following topics to help you create an AppLocker policy deployment plan for your organization that will address your specific application control requirements by department, organizational unit, or business group:
+You can develop an application control policy plan to guide you in making successful deployment decisions. For more information about how to develop this policy and what you should consider, see the [AppLocker Design Guide](applocker-policies-design-guide.md). This guide is intended for security architects, security administrators, and system administrators. It contains the following articles to help you create an AppLocker policy deployment plan for your organization that addresses your specific application control requirements by department, organizational unit, or business group:
-1. [Understand the AppLocker policy deployment process](understand-the-applocker-policy-deployment-process.md)
-2. [Understand AppLocker policy design decisions](understand-applocker-policy-design-decisions.md)
-3. [Determine your application control objectives](determine-your-application-control-objectives.md)
-4. [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md)
-5. [Select the types of rules to create](select-types-of-rules-to-create.md)
-6. [Determine the Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md)
-7. [Plan for AppLocker policy management](plan-for-applocker-policy-management.md)
+1. [Understand the AppLocker policy deployment process](understand-the-applocker-policy-deployment-process.md)
+2. [Understand AppLocker policy design decisions](understand-applocker-policy-design-decisions.md)
+3. [Determine your application control objectives](determine-your-application-control-objectives.md)
+4. [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md)
+5. [Select the types of rules to create](select-types-of-rules-to-create.md)
+6. [Determine the Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md)
+7. [Plan for AppLocker policy management](plan-for-applocker-policy-management.md)
## Step 2: Create your rules and rule collections
-Each rule applies to one or more apps, and it imposes a specific rule condition on them. Rules can be created individually or they can be generated by the Automatically Generate Rules Wizard. For the steps to create the rules, see [Create Your AppLocker rules](create-your-applocker-rules.md).
+Each rule applies to one or more apps, and it imposes a specific rule condition on them. Rules can be created individually or by using the Automatically Generate Rules Wizard. For the steps to create the rules, see [Create Your AppLocker rules](create-your-applocker-rules.md).
## Step 3: Configure the enforcement setting
-An AppLocker policy is a set of rule collections that are configured with a rule enforcement setting. The enforcement setting can be **Enforce rules**, **Audit only**, or **Not configured**. If an AppLocker policy has at least one rule, and it's set to **Not configured**, all the rules in that
-policy will be enforced. For info about configuring the rule enforcement setting, see [Configure an AppLocker policy for audit only](configure-an-applocker-policy-for-audit-only.md) and [Configure an AppLocker policy for enforce rules](configure-an-applocker-policy-for-enforce-rules.md).
+An AppLocker policy is a set of rule collections that are configured with a rule enforcement mode setting. The enforcement mode setting can be **Enforce rules**, **Audit only**, or **Not configured**. If an AppLocker rule collection has at least one rule, and is set to **Not configured**, the rules in that rule collection are enforced. For info about configuring the rule enforcement setting, see [Configure an AppLocker policy for audit only](configure-an-applocker-policy-for-audit-only.md) and [Configure an AppLocker policy for enforce rules](configure-an-applocker-policy-for-enforce-rules.md).
## Step 4: Update the GPO
@@ -49,15 +45,16 @@ In a test environment or with the enforcement setting set at **Audit only**, ver
Depending on your deployment method, import the AppLocker policy to the GPO in your production environment, or if the policy is already deployed, change the enforcement setting to your production environment value-**Enforce rules** or **Audit only**.
## Step 7: Test the effect of the policy and adjust
+
Validate the effect of the policy by analyzing the AppLocker logs for application usage, and then modify the policy as necessary. For information on how to do these tasks, see [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md).
## Next steps
-Follow the steps described in the following topics to continue the deployment process:
+Follow the steps described in the following articles to continue the deployment process:
-1. [Create Your AppLocker rules](create-your-applocker-rules.md)
-2. [Test and update an AppLocker policy](test-and-update-an-applocker-policy.md)
-3. [Deploy the AppLocker policy into production](deploy-the-applocker-policy-into-production.md)
+1. [Create Your AppLocker rules](create-your-applocker-rules.md)
+2. [Test and update an AppLocker policy](test-and-update-an-applocker-policy.md)
+3. [Deploy the AppLocker policy into production](deploy-the-applocker-policy-into-production.md)
## See also
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-rules.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-rules.md
index c32cbf3af1..e04367462f 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-rules.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-rules.md
@@ -1,71 +1,67 @@
---
title: Create Your AppLocker rules
-description: This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
+description: This article for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/22/2023
---
# Create Your AppLocker rules
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
+This article for the IT professional describes what you need to know about AppLocker rules and the methods used to create rules.
## Creating AppLocker rules
-AppLocker rules apply to the targeted app, and they're the components that make up the AppLocker policy. Depending on your IT environment and the business group that requires application control policies, setting these access rules for each application can be time-consuming and prone to error. With AppLocker, you can generate rules automatically or create rules individually. Creating rules that are derived from your planning document can help you avoid unintended results. For info about this planning document and other planning activities, see [AppLocker Design Guide](applocker-policies-design-guide.md).
+AppLocker rules control what apps run in your organization. Depending on the complexity of your organization's application requirements, managing these application control rules can be time-consuming and error prone. With AppLocker, you can generate rules automatically or create rules individually. Creating rules that are derived from your planning document can help you avoid unintended results. For info about this planning document and other planning activities, see [AppLocker Design Guide](applocker-policies-design-guide.md).
### Automatically generate your rules
-You can use a reference device to automatically create a set of default rules for each of the installed apps, test and modify each rule as necessary, and deploy the policies. Creating most of the rules for all the installed apps gives you a starting point to build and test your policies. For info about performing this task, see the following topics:
+You can use a reference device to automatically create a set of default rules for each of the installed apps, test and modify each rule as necessary, and deploy the policies. Creating rules for all installed apps gives you a starting point to build and test your policies. For info about performing this task, see the following articles:
-- [Configure the AppLocker reference device](configure-the-appLocker-reference-device.md)
-- [Run the Automatically Generate Rules wizard](run-the-automatically-generate-rules-wizard.md)
-- [Create AppLocker default rules](create-applocker-default-rules.md)
-- [Edit AppLocker rules](edit-applocker-rules.md)
-- [Add exceptions for an AppLocker rule](configure-exceptions-for-an-applocker-rule.md)
+- [Configure the AppLocker reference device](configure-the-appLocker-reference-device.md)
+- [Run the Automatically Generate Rules wizard](run-the-automatically-generate-rules-wizard.md)
+- [Create AppLocker default rules](create-applocker-default-rules.md)
+- [Edit AppLocker rules](edit-applocker-rules.md)
+- [Add exceptions for an AppLocker rule](configure-exceptions-for-an-applocker-rule.md)
### Create your rules individually
-You can create rules and set the mode to **Audit only** for each installed app, test and update each rule as necessary, and then deploy the policies. Creating rules individually might be best when you're targeting a few applications within a business group.
+Creating rules individually might be best when you're managing a few applications within a business group.
+
+> [!NOTE]
+> The AppLocker wizards can generate default rules for each rule collection. These rules are intended to help ensure that the files that are required for Windows to operate properly are allowed in an AppLocker rule collection. You can also edit the default rules. For information about creating the default rules for the Windows operating system, see [Create AppLocker default rules](create-applocker-default-rules.md).
->**Note:** AppLocker includes default rules for each rule collection. These rules are intended to help ensure that the files that are required for Windows to operate properly are allowed in an AppLocker rule collection. You can also edit the default rules. For information about creating the default rules for the Windows operating system, see [Create AppLocker default rules](create-applocker-default-rules.md).
-
For information about performing this task, see:
-1. [Create a rule that uses a publisher condition](create-a-rule-that-uses-a-publisher-condition.md)
-2. [Create a rule that uses a path condition](create-a-rule-that-uses-a-path-condition.md)
-3. [Create a rule that uses a file hash condition](create-a-rule-that-uses-a-file-hash-condition.md)
-4. [Edit AppLocker rules](edit-applocker-rules.md)
-5. [Enforce AppLocker rules](enforce-applocker-rules.md)
-6. [Configure an AppLocker policy for audit only](configure-an-applocker-policy-for-audit-only.md)
+1. [Create a rule that uses a publisher condition](create-a-rule-that-uses-a-publisher-condition.md)
+2. [Create a rule that uses a path condition](create-a-rule-that-uses-a-path-condition.md)
+3. [Create a rule that uses a file hash condition](create-a-rule-that-uses-a-file-hash-condition.md)
+4. [Edit AppLocker rules](edit-applocker-rules.md)
+5. [Enforce AppLocker rules](enforce-applocker-rules.md)
+6. [Configure an AppLocker policy for audit only](configure-an-applocker-policy-for-audit-only.md)
## About selecting rules
-AppLocker policies are composed of distinct rules for specific apps. These rules are grouped by collection, and they're implemented through an AppLocker policy definition. AppLocker policies are managed by using Group Policy or by using the Local Security Policy snap-in for a single computer.
-
-When you determine what types of rules to create for each of your business groups or organizational units (OUs), you should also determine what enforcement setting to use for each group. Certain rule types are more applicable for some apps, depending on how the apps are deployed in a specific business group.
+AppLocker policies are composed of rules to allow or deny specific app files. These rules are grouped into rule collections, and they're implemented through an AppLocker policy definition. AppLocker policies are managed by using Group Policy or by using the Local Security Policy snap-in for a single computer.
For info about how to determine and document your AppLocker rules, see [AppLocker Design Guide](applocker-policies-design-guide.md).
-For info about AppLocker rules and AppLocker policies, see the following topics:
+For info about AppLocker rules and AppLocker policies, see the following articles:
-- [Understanding AppLocker rule behavior](understanding-applocker-rule-behavior.md)
-- [Understanding AppLocker rule exceptions](understanding-applocker-rule-exceptions.md)
-- [Understanding AppLocker rule collections](understanding-applocker-rule-collections.md)
-- [Understanding AppLocker allow and deny actions on rules](understanding-applocker-allow-and-deny-actions-on-rules.md)
-- [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md)
-- [Understanding AppLocker default rules](understanding-applocker-default-rules.md)
+- [Understanding AppLocker rule behavior](understanding-applocker-rule-behavior.md)
+- [Understanding AppLocker rule exceptions](understanding-applocker-rule-exceptions.md)
+- [Understanding AppLocker rule collections](understanding-applocker-rule-collections.md)
+- [Understanding AppLocker allow and deny actions on rules](understanding-applocker-allow-and-deny-actions-on-rules.md)
+- [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md)
+- [Understanding AppLocker default rules](understanding-applocker-default-rules.md)
## Next steps
-1. [Import an AppLocker policy into a GPO](import-an-applocker-policy-into-a-gpo.md)
-2. [Import an AppLocker policy from another computer](import-an-applocker-policy-from-another-computer.md)
-3. [Test and update an AppLocker policy](test-and-update-an-applocker-policy.md)
-4. [Deploy the AppLocker policy into production](deploy-the-applocker-policy-into-production.md)
+1. [Import an AppLocker policy into a GPO](import-an-applocker-policy-into-a-gpo.md)
+2. [Import an AppLocker policy from another computer](import-an-applocker-policy-from-another-computer.md)
+3. [Test and update an AppLocker policy](test-and-update-an-applocker-policy.md)
+4. [Deploy the AppLocker policy into production](deploy-the-applocker-policy-into-production.md)
-## Related topics
+## Related articles
- [Create Your AppLocker policies](create-your-applocker-policies.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md
index da372fd5b0..38a183679a 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md
@@ -1,42 +1,39 @@
---
title: Deploy the AppLocker policy into production
-description: This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
+description: This article for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/22/2023
---
# Deploy the AppLocker policy into production
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
-This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
+After successfully testing and modifying the AppLocker policy for each Group Policy Object (GPO), you're ready to deploy the enforcement settings into production. For most organizations, this means switching the AppLocker enforcement mode setting from **Audit only** to **Enforce rules** for a rule collection. Be sure to follow the deployment plan that you created earlier. For more info, see the [AppLocker Design Guide](applocker-policies-design-guide.md). Depending on the needs of different business groups in your organization, you might deploy different enforcement mode settings for linked GPOs.
-After successfully testing and modifying the AppLocker policy for each Group Policy Object (GPO), you are ready to deploy the enforcement settings into production. For most organizations, this means switching the AppLocker enforcement setting from **Audit only** to **Enforce rules**. However, it is important to follow the deployment plan that you created earlier. For more info, see the [AppLocker Design Guide](applocker-policies-design-guide.md). Depending on the needs of different business groups in your organization, you might deploy different enforcement settings for linked GPOs.
-
-### Understand your design decisions
+## Understand your design decisions
Before you deploy an AppLocker policy, you should determine:
-- For each business group, which applications will be controlled and in what manner. For more info, see [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md).
-- How to handle requests for application access. For info about what to consider when developing your support policies, see [Plan for AppLocker policy management](plan-for-applocker-policy-management.md).
-- How to manage events, including forwarding events. For info about event management in AppLocker, see [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md).
-- Your GPO structure, including how to include policies generated by Software Restriction Policies and AppLocker policies. For more info, see [Determine the Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md).
+- For each business group, which applications to control and in what manner. For more info, see [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md).
+- How to handle requests for application access. For info about what to consider when developing your support policies, see [Plan for AppLocker policy management](plan-for-applocker-policy-management.md).
+- How to manage events, including forwarding events. For info about event management in AppLocker, see [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md).
+- Your GPO structure, including how to include policies generated by Software Restriction Policies and AppLocker policies. For more info, see [Determine the Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md).
For info about how AppLocker deployment is dependent on design decisions, see [Understand AppLocker policy design decisions](understand-applocker-policy-design-decisions.md).
-### AppLocker deployment methods
+## AppLocker deployment methods
-If you have configured a reference device, you can create and update your AppLocker policies on this device, test the policies, and then export the policies to the appropriate GPO for distribution. Another method is to create the policies and set the enforcement setting on **Audit only**, then
-observe the events that are generated.
-- [Use a reference device to create and maintain AppLocker policies](use-a-reference-computer-to-create-and-maintain-applocker-policies.md)
+If you configure a reference device, you can create and update your AppLocker policies on this device, test the policies, and then export the policies to the appropriate GPO for distribution. Another method is to create the policies and set the enforcement setting on **Audit only**, then observe the events that are generated.
- This topic describes the steps to use an AppLocker reference computer to prepare application control policies for deployment by using Group Policy or other means.
+- [Use a reference device to create and maintain AppLocker policies](use-a-reference-computer-to-create-and-maintain-applocker-policies.md)
-- [Deploy AppLocker policies by using the enforce rules setting](deploy-applocker-policies-by-using-the-enforce-rules-setting.md)
+ This article describes the steps to use an AppLocker reference computer to prepare application control policies for deployment by using Group Policy or other means.
- This topic describes the steps to deploy the AppLocker policy by changing the enforcement setting to **Audit only** or to **Enforce rules**.
+- [Deploy AppLocker policies by using the enforce rules setting](deploy-applocker-policies-by-using-the-enforce-rules-setting.md)
+
+ This article describes the steps to deploy the AppLocker policy by changing the enforcement mode setting to **Audit only** or to **Enforce rules**.
## See also
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md
index 70a6f0b415..eb55e89166 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md
@@ -1,65 +1,64 @@
---
title: Requirements for deploying AppLocker policies
-description: This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.
+description: This deployment article for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/22/2023
---
# Requirements for deploying AppLocker policies
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.
+This deployment article for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.
The following requirements must be met or addressed before you deploy your AppLocker policies:
-- [Deployment plan](#bkmk-reqdepplan)
-- [Supported operating systems](#bkmk-reqsupportedos)
-- [Policy distribution mechanism](#bkmk-reqpolicydistmech)
-- [Event collection and analysis system](#bkmk-reqeventcollectionsystem)
-### Deployment plan
+- [Deployment plan](#deployment-plan)
+- [Supported operating systems](#supported-operating-systems)
+- [Policy distribution mechanism](#policy-distribution-mechanism)
+- [Event collection and analysis system](#event-collection-and-analysis-system)
-An AppLocker policy deployment plan is the result of investigating which applications are required and necessary in your organization, which apps are optional, and which apps are forbidden. To develop this plan, see [AppLocker Design Guide](applocker-policies-design-guide.md). The following table is an example of the data you need to collect and the decisions you need to make to successfully deploy AppLocker policies on the supported operating systems (as listed in [Requirements to use AppLocker](requirements-to-use-applocker.md)).
+## Deployment plan
+
+A successful AppLocker policy deployment begins with a policy design that allows the applications needed by your organization and prevents unauthorized apps, including malware, from running. To develop this plan, see [AppLocker Design Guide](applocker-policies-design-guide.md). The following table is an example of the data you need to collect and the decisions you need to make to successfully deploy AppLocker policies.
|Business group|Organizational unit|Implement AppLocker?|Apps|Installation path|Use default rule or define new rule condition|Allow or deny|GPO name|Support policy|
-|--- |--- |--- |--- |--- |--- |--- |--- |--- |
+| --- | --- | --- | --- | --- | --- | --- | --- | --- |
|Bank Tellers|Teller-East and Teller-West|Yes|Teller software|C:\Program Files\Woodgrove\Teller.exe|File is signed; create a publisher condition|Allow|Tellers|Web help|
||||Windows files|C:\Windows|Create a path exception to the default rule to exclude \Windows\Temp|Allow||Help Desk|
-||||Time Sheet Organizer|C:\Program Files\Woodgrove\HR\Timesheet.exe|File is not signed; create a file hash condition|Allow||Web help|
+||||Time Sheet Organizer|C:\Program Files\Woodgrove\HR\Timesheet.exe|File isn't signed; create a file hash condition|Allow||Web help|
|Human Resources|HR-All|Yes|Check Payout|C:\Program Files\Woodgrove\HR\Checkcut.exe|File is signed; create a publisher condition|Allow|HR|Web help|
||||Internet Explorer 7|C:\Program Files\Internet Explorer|File is signed; create a publisher condition|Deny||Help Desk|
||||Windows files|C:\Windows|Use the default rule for the Windows path|Allow||Help Desk|
-
-Event processing policy
+
+### Event processing policy
|Business group|AppLocker event collection location|Archival policy|Analyzed?|Security policy|
-|--- |--- |--- |--- |--- |
+| --- | --- | --- | --- | --- |
|Bank Tellers|Forwarded to: srvBT093|Standard|None|Standard|
|Human Resources|Do not forward|60 months|Yes; summary reports monthly to managers|Standard|
-
-Policy maintenance policy
+
+### Policy maintenance policy
|Business group|Rule update policy|App decommission policy|App version policy|App deployment policy|
-|--- |--- |--- |--- |--- |
-|Bank Tellers|Planned: Monthly through business office triageEmergency: Request through Help Desk|Through business office triage; 30-day notice required|General policy: Keep past versions for 12 months
List policies for each application|Coordinated through business office; 30-day notice required|
-|Human Resources|Planned: Through HR triage
Emergency: Request through Help Desk|Through HR triage; 30-day notice required|General policy: Keep past versions for 60 months
List policies for each application|Coordinated through HR; 30-day notice required|
-
-### Supported operating systems
+| --- | --- | --- | --- | --- |
+| Bank Tellers | Planned: Monthly through business office triage
Emergency: Request through Help Desk | Through business office triage; 30-day notice required | General policy: Keep past versions for 12 months
List policies for each application | Coordinated through business office; 30-day notice required |
+| Human Resources | Planned: Through HR triage
Emergency: Request through Help Desk | Through HR triage; 30-day notice required |General policy: Keep past versions for 60 months
List policies for each application | Coordinated through HR; 30-day notice required |
-AppLocker is supported only on certain operating systems. Some features are not available on all operating systems. For more information, see [Requirements to use AppLocker](requirements-to-use-applocker.md).
+## Supported operating systems
-### Policy distribution mechanism
+AppLocker is supported only on certain operating systems. Some features aren't available on all operating systems. For more information, see [Requirements to use AppLocker](requirements-to-use-applocker.md).
-You need a way to distribute the AppLocker policies throughout the targeted business groups. AppLocker uses Group Policy management architecture to effectively distribute application control policies. AppLocker policies can also be configured on individual computers by using the Local Security Policy snap-in.
+## Policy distribution mechanism
-### Event collection and analysis system
+You need a way to distribute the AppLocker policies throughout the targeted business groups. AppLocker uses Group Policy management architecture to effectively distribute application control policies. AppLocker policies can also be configured on individual computers by using the Local Security Policy snap-in. AppLocker rules can also be distributed through a mobile device management solution, like Microsoft Intune.
+
+## Event collection and analysis system
Event processing is important to understand application usage. You must have a process in place to collect and analyze AppLocker events so that application usage is appropriately restricted and understood. For procedures to monitor AppLocker events, see:
-- [Configure an AppLocker policy for audit only](configure-an-applocker-policy-for-audit-only.md)
-- [Configure an AppLocker policy for enforce rules](configure-an-applocker-policy-for-enforce-rules.md)
-- [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md)
+
+- [Configure an AppLocker policy for audit only](configure-an-applocker-policy-for-audit-only.md)
+- [Configure an AppLocker policy for enforce rules](configure-an-applocker-policy-for-enforce-rules.md)
+- [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md)
## See also
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md
index d06e82f836..3340e10f44 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md
@@ -1,19 +1,16 @@
---
title: Understand the AppLocker policy deployment process
-description: This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies.
+description: This planning and deployment article for the IT professional describes the process for using AppLocker when deploying application control policies.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/22/2023
---
# Understand the AppLocker policy deployment process
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This planning and deployment article for the IT professional describes the process for using AppLocker when deploying application control policies.
-This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies.
-
-To successfully deploy AppLocker policies, you need to identify your application control objectives and construct the policies for those objectives. The key to the process is taking an accurate inventory of your organization's applications, which requires investigation of all the targeted business groups. With an accurate inventory, you can create rules and set enforcement criteria that will allow the organization to use the required applications and allow the IT department to manage a controlled set of applications.
+To successfully deploy AppLocker policies, you need to identify your application control objectives and construct the policies for those objectives. The key to the process is taking an accurate inventory of your organization's applications, which requires investigation of all the targeted business groups. With an accurate inventory, you can create and deploy policies that allow the organization's required applications and provide IT the control they need over the organization's app landscape.
The following diagram shows the main points in the design, planning, and deployment process for AppLocker.
@@ -21,9 +18,9 @@ The following diagram shows the main points in the design, planning, and deploym
## Resources to support the deployment process
-The following topics contain information about designing, planning, deploying, and maintaining AppLocker policies:
+The following articles contain information about designing, planning, deploying, and maintaining AppLocker policies:
-- For info about the AppLocker policy design and planning requirements and process, see [AppLocker Design Guide](applocker-policies-design-guide.md).
-- For info about the AppLocker policy deployment requirements and process, see [AppLocker deployment guide](applocker-policies-deployment-guide.md).
-- For info about AppLocker policy maintenance and monitoring, see [Administer AppLocker](administer-applocker.md).
-- For info about AppLocker policy architecture, components, and processing, see [AppLocker technical reference](applocker-technical-reference.md).
+- For info about the AppLocker policy design and planning requirements and process, see [AppLocker Design Guide](applocker-policies-design-guide.md).
+- For info about the AppLocker policy deployment requirements and process, see [AppLocker deployment guide](applocker-policies-deployment-guide.md).
+- For info about AppLocker policy maintenance and monitoring, see [Administer AppLocker](administer-applocker.md).
+- For info about AppLocker policy architecture, components, and processing, see [AppLocker technical reference](applocker-technical-reference.md).
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md
index c86f226134..47b1b1388d 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md
@@ -1,17 +1,14 @@
---
title: Use a reference device to create and maintain AppLocker policies
-description: This topic for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
+description: This article for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/22/2023
---
# Use a reference device to create and maintain AppLocker policies
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
+This article for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
## Background and prerequisites
@@ -19,51 +16,52 @@ An AppLocker reference device is a baseline device you can use to configure poli
An AppLocker reference device that is used to create and maintain AppLocker policies should contain the corresponding apps for each organizational unit (OU) to mimic your production environment.
->**Important:** The reference device must be running one of the supported editions of Windows. For information about operating system requirements for AppLocker, see [Requirements to use AppLocker](requirements-to-use-applocker.md).
-
-You can perform AppLocker policy testing on the reference device by using the **Audit only** enforcement setting or Windows PowerShell cmdlets. You can also use the reference device as part of a testing configuration that includes policies that are created by using Software Restriction Policies.
+You can perform AppLocker policy testing on the reference device by using the **Audit only** enforcement mode setting or Windows PowerShell cmdlets.
## Step 1: Automatically generate rules on the reference device
With AppLocker, you can automatically generate rules for all files within a folder. AppLocker scans the specified folder and creates the condition types that you choose for each file in that folder. For information on how to automatically generate rules, see [Run the Automatically Generate Rules wizard](run-the-automatically-generate-rules-wizard.md).
->**Note:** If you run this wizard to create your first rules for a Group Policy Object (GPO), after you complete the wizard, you will be prompted to create the default rules, which allow critical system files to run. You can edit the default rules at any time. If your organization has decided to edit the default rules or create custom rules to allow the Windows system files to run, ensure that you delete the default rules after you replace them with your custom rules.
-
+> [!NOTE]
+> If you run this wizard to create your first rules for a Group Policy Object (GPO), you will be prompted to create the default rules which allow critical system files to run. You can edit the default rules at any time. If your organization uses custom rules to allow the Windows system files to run, ensure that you delete the default rules after you create your custom rules.
+
## Step 2: Create the default rules on the reference device
AppLocker includes default rules for each rule collection. These rules are intended to help ensure that the files that are required for Windows to operate properly are allowed in an AppLocker rule collection. You must run the default rules for each rule collection. For info about default rules and considerations for using them, see [Understanding AppLocker default rules](understanding-applocker-default-rules.md). For the procedure to create default rules, see [Create AppLocker default rules](create-applocker-default-rules.md).
->**Important:** You can use the default rules as a template when you create your own rules. This allows files within the Windows directory to run. However, these rules are only meant to function as a starter policy when you are first testing AppLocker rules.
-
+> [!IMPORTANT]
+> You can use the default rules as a template when you create your own rules. This allows files within the Windows directory to run. However, these rules are only meant to function as a starter policy when you are first testing AppLocker rules.
+
## Step 3: Modify rules and the rule collection on the reference device
-If AppLocker policies are currently running in your production environment, export the policies from the corresponding GPOs and save them to the reference device. For information on how to export and save the policies, see [Export an AppLocker policy from a GPO](export-an-applocker-policy-from-a-gpo.md). If no AppLocker policies have been deployed, create the rules and develop the policies by using the following procedures:
+If AppLocker policies are currently running in your production environment, export the policies from the corresponding GPOs and save them to the reference device. For information on how to export and save the policies, see [Export an AppLocker policy from a GPO](export-an-applocker-policy-from-a-gpo.md). If no AppLocker policies are deployed, create the rules and develop the policies by using the following procedures:
-- [Create a rule that uses a publisher condition](create-a-rule-that-uses-a-publisher-condition.md)
-- [Create a rule that uses a file hash condition](create-a-rule-that-uses-a-file-hash-condition.md)
-- [Create a rule that uses a path condition](create-a-rule-that-uses-a-path-condition.md)
-- [Edit AppLocker rules](edit-applocker-rules.md)
-- [Add exceptions for an AppLocker rule](configure-exceptions-for-an-applocker-rule.md)
-- [Delete an AppLocker rule](delete-an-applocker-rule.md)
-- [Enable the DLL rule collection](enable-the-dll-rule-collection.md)
-- [Enforce AppLocker rules](enforce-applocker-rules.md)
+- [Create a rule that uses a publisher condition](create-a-rule-that-uses-a-publisher-condition.md)
+- [Create a rule that uses a file hash condition](create-a-rule-that-uses-a-file-hash-condition.md)
+- [Create a rule that uses a path condition](create-a-rule-that-uses-a-path-condition.md)
+- [Edit AppLocker rules](edit-applocker-rules.md)
+- [Add exceptions for an AppLocker rule](configure-exceptions-for-an-applocker-rule.md)
+- [Delete an AppLocker rule](delete-an-applocker-rule.md)
+- [Enable the DLL rule collection](enable-the-dll-rule-collection.md)
+- [Enforce AppLocker rules](enforce-applocker-rules.md)
## Step 4: Test and update AppLocker policy on the reference device
-You should test each set of rules to ensure that they perform as intended. The **Test-AppLockerPolicy** Windows PowerShell cmdlet can be used to determine whether any of the rules in your rule collection will be blocked on your reference device. Perform the steps on each reference device that you used to define the AppLocker policy. Ensure that the reference device is joined to the domain and that it's receiving the AppLocker policy from the appropriate GPO. Because AppLocker rules are inherited from linked GPOs, you should deploy all of the rules to simultaneously test all of your test GPOs. Use the following procedures to complete this step:
+You should test each set of rules to ensure that they perform as intended. The **Test-AppLockerPolicy** Windows PowerShell cmdlet can be used to determine whether any apps on your reference device are blocked by the rules in your rule collections. Perform the steps on each reference device that you used to define the AppLocker policy. Ensure that the reference device is joined to the domain and that it's receiving the AppLocker policy from the appropriate GPO. Because AppLocker rules are inherited from linked GPOs, you should deploy all of the rules to simultaneously test all of your test GPOs. Use the following procedures to complete this step:
-- [Test an AppLocker Policy with Test-AppLockerPolicy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee791772(v=ws.10))
-- [Discover the Effect of an AppLocker Policy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee791823(v=ws.10))
+- [Test an AppLocker Policy with Test-AppLockerPolicy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee791772(v=ws.10))
+- [Discover the Effect of an AppLocker Policy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee791823(v=ws.10))
+
+> [!WARNING]
+> If you have set the enforcement mode setting on the rule collection to **Enforce rules** or **Not configured**, the policy will be enforced upon completing the next step. Set the enforcement mode setting on the rule collection to **Audit only** if you aren't ready to block any files from running.
->**Caution:** If you have set the enforcement setting on the rule collection to **Enforce rules** or you have not configured the rule collection, the policy will be implemented when the GPO is updated in the next step. If you have set the enforcement setting on the rule collection to **Audit only**, application access events are written to the AppLocker log, and the policy will not take effect.
-
## Step 5: Export and import the policy into production
-When the AppLocker policy has been tested successfully, it can be imported into the GPO (or imported into individual computers that aren't managed by Group Policy) and checked for its intended effectiveness. To do these tasks, perform the following procedures:
+After you test your AppLocker policy, you can import it into the GPO (or imported into individual computers not managed by Group Policy) and checked for its intended effectiveness. To do these tasks, perform the following procedures:
-- [Export an AppLocker policy to an XML file](export-an-applocker-policy-to-an-xml-file.md)
-- [Import an AppLocker policy into a GPO](import-an-applocker-policy-into-a-gpo.md) or
-- [Discover the Effect of an AppLocker Policy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee791823(v=ws.10))
+- [Export an AppLocker policy to an XML file](export-an-applocker-policy-to-an-xml-file.md)
+- [Import an AppLocker policy into a GPO](import-an-applocker-policy-into-a-gpo.md) or
+- [Discover the Effect of an AppLocker Policy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee791823(v=ws.10))
If the AppLocker policy enforcement setting is **Audit only** and you're satisfied that the policy is fulfilling your intent, you can change it to **Enforce rules**. For info about how to change the enforcement setting, see [Configure an AppLocker policy for enforce rules](configure-an-applocker-policy-for-enforce-rules.md).
@@ -71,9 +69,9 @@ If the AppLocker policy enforcement setting is **Audit only** and you're satisfi
If more refinements or updates are necessary after a policy is deployed, use the appropriate following procedures to monitor and update the policy:
-- [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md)
-- [Edit an AppLocker policy](edit-an-applocker-policy.md)
-- [Refresh an AppLocker policy](refresh-an-applocker-policy.md)
+- [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md)
+- [Edit an AppLocker policy](edit-an-applocker-policy.md)
+- [Refresh an AppLocker policy](refresh-an-applocker-policy.md)
## See also
From c3e35ec54146c4db19c7574c0916a4851c1c0cc8 Mon Sep 17 00:00:00 2001
From: jsuther1974
Date: Sat, 23 Dec 2023 09:09:45 -0800
Subject: [PATCH 4/7] Reviewed AppLocker articles for accuracy and fixed
Acrolinx and readability issues.
---
.../applocker-policy-use-scenarios.md | 60 ++++++++----------
.../applocker-technical-reference.md | 35 +++++------
...onfigure-the-appLocker-reference-device.md | 40 ++++++------
...igitally-signed-on-a-reference-computer.md | 20 +++---
.../requirements-to-use-applocker.md | 48 +++++---------
.../applocker/what-is-applocker.md | 63 ++++---------------
6 files changed, 99 insertions(+), 167 deletions(-)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md
index 7657e480fa..a2776beaac 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md
@@ -1,56 +1,50 @@
---
title: AppLocker policy use scenarios
-description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
+description: This article for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# AppLocker policy use scenarios
-> [!NOTE]
-> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
-This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
+AppLocker can help you improve the management of application control and the maintenance of application control policies. Application control scenarios addressed by AppLocker include:
-AppLocker can help you improve the management of application control and the maintenance of application control policies. Application control scenarios addressed by AppLocker can be categorized as follows:
+1. **App inventory**
-1. **App inventory**
+ AppLocker can apply its policy in an audit-only mode where all app access activity is collected in event logs for further analysis. Windows PowerShell cmdlets are also available to help you understand app usage and access.
- AppLocker has the ability to enforce its policy in an audit-only mode where all app access activity is collected in event logs for further analysis. Windows PowerShell cmdlets are also available to help you understand app usage and access.
+2. **Protection against unwanted software**
-2. **Protection against unwanted software**
+ AppLocker can block apps from running simply by excluding them from the list of allowed apps per business group or user. Any app not allowed by your policy based on its publisher, installation path, or file hash, is blocked.
- AppLocker has the ability to deny apps from running simply by excluding them from the list of allowed apps per business group or user. If an app isn't identified by its publisher, installation path, or file hash, the attempt to run the application fails.
+3. **Licensing conformance**
-3. **Licensing conformance**
+ With AppLocker's app inventory described earlier, you can identify the software that corresponds to your software licensing agreements and restrict application usage based on licensing agreements.
- AppLocker can provide an inventory of software usage within your organization, so you can identify the software that corresponds to your software licensing agreements and restrict application usage based on licensing agreements.
+4. **Software standardization**
-4. **Software standardization**
+ AppLocker policies can allow only supported or approved apps to run on computers within a business group. This configuration permits a more uniform app deployment.
- AppLocker policies can be configured to allow only supported or approved apps to run on computers within a business group. This configuration permits a more uniform app deployment.
-
-5. **Manageability improvement**
-
- AppLocker policies can be modified and deployed through your existing Group Policy infrastructure and can work in conjunction with policies created by using Software Restriction Policies. As you manage ongoing change in your support of a business group's apps, you can modify policies and use the AppLocker cmdlets to test the policies for the expected results. You can also design application control policies for situations in which users share computers.
-
-### Use scenarios
+## Use scenarios
The following are examples of scenarios in which AppLocker can be used:
-- Your organization implements a policy to standardize the applications used within each business group, so you need to determine the expected usage compared to the actual usage.
-- The security policy for application usage has changed, and you need to evaluate where and when those deployed apps are being accessed.
-- Your organization's security policy dictates the use of only licensed software, so you need to determine which apps aren't licensed or prevent unauthorized users from running licensed software.
-- An app is no longer supported by your organization, so you need to prevent it from being used by everyone.
-- Your organization needs to restrict the use of Universal Windows apps to just those apps your organization approves of or develops.
-- The potential that unwanted software can be introduced in your environment is high, so you need to reduce this threat.
-- The license to an app has been revoked or is expired in your organization, so you need to prevent it from being used by everyone.
-- A new app or a new version of an app is deployed, and you need to allow certain groups to use it.
-- Specific software tools aren't allowed within the organization, or only specific users have access to those tools.
-- A single user or small group of users needs to use a specific app that is denied for all others.
-- Some computers in your organization are shared by people who have different software usage needs.
-- In addition to other measures, you need to control the access to sensitive data through app usage.
+- Your organization implements a policy to standardize the applications used within each business group, so you need to determine the expected usage compared to the actual usage.
+- Your security policy for application usage changed, and you need to evaluate where and when those deployed apps are being accessed.
+- Your organization's security policy dictates the use of only licensed software, so you need to determine which apps aren't licensed or prevent unauthorized users from running licensed software.
+- An app is no longer supported by your organization, so you need to prevent it from being used by everyone.
+- Your organization needs to restrict the use of Universal Windows apps to just those apps your organization approves of or develops.
+- The potential that unwanted software can be introduced in your environment is high, so you need to reduce this threat.
+- The license to an app is revoked or expired in your organization, so you need to prevent it from being used by everyone.
+- A new app or a new version of an app is deployed, and you need to allow certain groups to use it.
+- Specific software tools aren't allowed within the organization, or only specific users have access to those tools.
+- A single user or small group of users needs to use a specific app that is denied for all others.
+- Some people who need access to different apps share computers in your organization.
+- In addition to other measures, you need to control the access to sensitive data through app usage.
+
+## Related articles
-## Related topics
- [AppLocker technical reference](applocker-technical-reference.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference.md
index 8f8b29113c..909445c4b9 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference.md
@@ -1,30 +1,27 @@
---
title: AppLocker technical reference
-description: This overview topic for IT professionals provides links to the topics in the technical reference.
+description: This overview article for IT professionals provides links to the articles in the technical reference.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# AppLocker technical reference
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This overview topic for IT professionals provides links to the topics in the technical reference.
-AppLocker advances the application control features and functionality of Software Restriction Policies. AppLocker contains new capabilities and extensions that allow you to create rules to allow or deny apps from running based on unique identities of files and to specify which users or groups can run those apps.
+This overview article for IT professionals provides links to the articles in the technical reference.
+AppLocker lets you create rules to allow or deny apps from running based on information about the apps' files. You can specify unique rules for different users or groups to control who can run those apps.
## In this section
-| Topic | Description |
-| - | - |
-| [What Is AppLocker?](what-is-applocker.md) | This topic for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies. |
-| [Requirements to use AppLocker](requirements-to-use-applocker.md) | This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems. |
-| [AppLocker policy use scenarios](applocker-policy-use-scenarios.md) | This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented. |
-| [How AppLocker works](how-applocker-works-techref.md) | This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies. |
-| [AppLocker architecture and components](applocker-architecture-and-components.md) | This topic for IT professional describes AppLocker's basic architecture and its major components. |
-| [AppLocker processes and interactions](applocker-processes-and-interactions.md) | This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules. |
-| [AppLocker functions](applocker-functions.md) | This topic for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features. |
-| [Security considerations for AppLocker](security-considerations-for-applocker.md) | This topic for the IT professional describes the security considerations you need to address when implementing AppLocker. |
-| [Tools to Use with AppLocker](tools-to-use-with-applocker.md) | This topic for the IT professional describes the tools available to create and administer AppLocker policies. |
-| [AppLocker Settings](applocker-settings.md) | This topic for the IT professional lists the settings used by AppLocker. |
+| Article | Description |
+| --- | --- |
+| [What Is AppLocker?](what-is-applocker.md) | This article for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies. |
+| [Requirements to use AppLocker](requirements-to-use-applocker.md) | This article for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems. |
+| [AppLocker policy use scenarios](applocker-policy-use-scenarios.md) | This article for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented. |
+| [How AppLocker works](how-applocker-works-techref.md) | This article for the IT professional provides links to articles about AppLocker architecture and components, processes and interactions, rules and policies. |
+| [AppLocker architecture and components](applocker-architecture-and-components.md) | This article for IT professional describes AppLocker's basic architecture and its major components. |
+| [AppLocker processes and interactions](applocker-processes-and-interactions.md) | This article for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules. |
+| [AppLocker functions](applocker-functions.md) | This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features. |
+| [Security considerations for AppLocker](security-considerations-for-applocker.md) | This article for the IT professional describes the security considerations you need to address when implementing AppLocker. |
+| [Tools to Use with AppLocker](tools-to-use-with-applocker.md) | This article for the IT professional describes the tools available to create and administer AppLocker policies. |
+| [AppLocker Settings](applocker-settings.md) | This article for the IT professional lists the settings used by AppLocker. |
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md
index eb422a3a03..9ad52b4cd3 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md
@@ -1,44 +1,42 @@
---
title: Configure the AppLocker reference device
-description: This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
+description: This article for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Configure the AppLocker reference device
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
+This article for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
An AppLocker reference device that is used for the development and deployment of AppLocker policies should mimic the directory structure and corresponding applications in the organizational unit (OU) or business group for the production environment. On a reference device, you can:
-- Maintain an application list for each business group.
-- Develop AppLocker policies by creating individual rules or by creating a policy by automatically generating rules.
-- Create the default rules to allow the Windows system files to run properly.
-- Run tests and analyze the event logs to determine the effect of the policies that you intend to deploy.
+- Maintain an application list for each business group.
+- Develop AppLocker policies by creating individual rules or by creating a policy by automatically generating rules.
+- Create the default rules to allow the Windows system files to run properly.
+- Run tests and analyze the event logs to determine the effect of the policies that you intend to deploy.
The reference device doesn't need to be joined to a domain, but it must be able to import and export AppLocker policies in XML format. The reference computer must be running one of the supported editions of Windows as listed in [Requirements to use AppLocker](requirements-to-use-applocker.md).
->**Warning:** Do not use operating system snapshots when creating AppLocker rules. If you take a snapshot of the operating system, install an app, create AppLocker rules, and then revert to a clean snapshot and repeat the process for another app, there is a chance that duplicate rule GUIDs can be created. If duplicate GUIDs are present, AppLocker policies will not work as expected.
-
-**To configure a reference device**
+> [!WARNING]
+> Don't use operating system snapshots when creating AppLocker rules. If you take a snapshot of the operating system, install an app, create AppLocker rules, and then revert to a clean snapshot and repeat the process for another app, there is a chance that duplicate rule GUIDs can be created. If duplicate GUIDs are present, AppLocker policies won't work as expected.
-1. If the operating system isn't already installed, install one of the supported editions of Windows on the device.
+## To configure a reference device
- >**Note:** If you have the Group Policy Management Console (GPMC) installed on another device to test your implementation of AppLocker policies, you can export the policies to that device
-
-2. Configure the administrator account.
+1. If the operating system isn't already installed, install one of the supported editions of Windows on the device.
- To update local policies, you must be a member of the local Administrators group. To update domain policies, you must be a member of the Domain Admins group or have been delegated privileges to use Group Policy to update a Group Policy Object (GPO).
+ >**Note:** If you have the Group Policy Management Console (GPMC) installed on another device to test your implementation of AppLocker policies, you can export the policies to that device.
-3. Install all apps that run in the targeted business group or OU by using the same directory structure.
+2. Configure the administrator account.
+
+ To update local policies, you must be a member of the local Administrators group. To update domain policies, you must be a member of the Domain Admins group or have delegated privileges to use Group Policy to update a Group Policy Object (GPO).
+
+3. Install all apps that run in the targeted business group or OU by using the same directory structure.
The reference device should be configured to mimic the structure of your production environment. It depends on having the same apps in the same directories to accurately create the rules.
### See also
-- After you configure the reference computer, you can create the AppLocker rule collections. You can build, import, or automatically generate the rules. For procedures to do this task, see [Working with AppLocker rules](working-with-applocker-rules.md).
-- [Use a reference device to create and maintain AppLocker policies](use-a-reference-computer-to-create-and-maintain-applocker-policies.md)
+- After you configure the reference computer, you can create the AppLocker rule collections. You can build, import, or automatically generate the rules. For procedures to do this task, see [Working with AppLocker rules](working-with-applocker-rules.md).
+- [Use a reference device to create and maintain AppLocker policies](use-a-reference-computer-to-create-and-maintain-applocker-policies.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md
index a654dfc5f7..56fef83f74 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md
@@ -1,31 +1,29 @@
---
title: Find digitally signed apps on a reference device
-description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
+description: This article for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Determine which apps are digitally signed on a reference device
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
+This article for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
The Windows PowerShell cmdlet **Get-AppLockerFileInformation** can be used to determine which apps installed on your reference devices are digitally signed. Perform the following steps on each reference computer that you used to define the AppLocker policy. The device doesn't need to be joined to the domain.
Membership in the local **Administrators** group, or equivalent, is the minimum required to complete this procedure.
-**To determine which apps are digitally signed on a reference device**
-1. Run **Get-AppLockerFileInformation** with the appropriate parameters.
+## To determine which apps are digitally signed on a reference device
- The **Get-AppLockerFileInformation** cmdlet retrieves the AppLocker file information from a list of files or from an event log. File information that is retrieved can include publisher information, file hash information, and file path information. File information from an event log may not contain all of these fields. Files that aren't signed don't have any publisher information.
+1. Run **Get-AppLockerFileInformation** with the appropriate parameters.
-2. Analyze the publisher's name and digital signature status from the output of the command.
+ The **Get-AppLockerFileInformation** cmdlet retrieves the AppLocker file information from a list of files or from an event log. File information that is retrieved can include publisher information, file hash information, and file path information. File information from an event log might not contain all of these fields. Files that aren't signed don't have any publisher information.
+
+2. Analyze the publisher's name and digital signature status from the output of the command.
For command parameters, syntax, and examples, see [Get-AppLockerFileInformation](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee460961(v=technet.10)).
-## Related topics
+## Related articles
- [Use a reference device to create and maintain AppLocker policies](use-a-reference-computer-to-create-and-maintain-applocker-policies.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-to-use-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-to-use-applocker.md
index 5d2b189772..3d5dcd1008 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-to-use-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-to-use-applocker.md
@@ -1,61 +1,43 @@
---
title: Requirements to use AppLocker
-description: This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
+description: This article for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Requirements to use AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
+This article for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
## General requirements
To use AppLocker, you need:
-- A device running a supported operating system to create the rules. The computer can be a domain controller.
-- For Group Policy deployment, at least one device with the Group Policy Management Console (GPMC) or Remote Server Administration Tools (RSAT) installed to host the AppLocker rules.
-- Devices running a supported operating system to enforce the AppLocker rules that you create.
+- A device running a supported operating system to create the rules. The computer can be a domain controller.
+- For Group Policy deployment, at least one device with the Group Policy Management Console (GPMC) or Remote Server Administration Tools (RSAT) installed to host the AppLocker rules.
+- Devices running a supported operating system to enforce the AppLocker rules that you create.
>[!NOTE]
->As of [KB 5024351](https://support.microsoft.com/help/5024351), Windows 10 versions 2004 and newer and all Windows 11 versions no longer require a specific edition of Windows to enforce AppLocker policies
-
+>As of [KB 5024351](https://support.microsoft.com/help/5024351), Windows 10 versions 2004 and newer and all Windows 11 versions no longer require a specific edition of Windows to enforce AppLocker policies.
+
## Operating system requirements
The following table shows the Windows versions on which AppLocker features are supported.
| Version | Can be configured | Can be enforced | Available rules | Notes |
-| - | - | - | - | - |
-| Windows 10 and Windows 11| Yes| Yes| Packaged apps
Executable
Windows Installer
Script
DLL| Policies are supported on all editions Windows 10 version 2004 and newer with [KB 5024351](https://support.microsoft.com/help/5024351).
Windows versions older than version 2004, including Windows Server 2019:
- Policies deployed through GP are only supported on Enterprise and Server editions.
- Policies deployed through MDM are supported on all editions.
|
-| Windows Server 2019
Windows Server 2016
Windows Server 2012 R2
Windows Server 2012| Yes| Yes| Packaged apps
Executable
Windows Installer
Script
DLL| |
-| Windows 8.1 Pro| Yes| No| N/A||
-| Windows 8.1 Enterprise| Yes| Yes| Packaged apps
Executable
Windows Installer
Script
DLL| |
-| Windows RT 8.1| No| No| N/A||
-| Windows 8 Pro| Yes| No| N/A||
-| Windows 8 Enterprise| Yes| Yes| Packaged apps
Executable
Windows Installer
Script
DLL||
-| Windows RT| No| No| N/A| |
-| Windows Server 2008 R2 Standard| Yes| Yes| Executable
Windows Installer
Script
DLL| Packaged app rules won't be enforced.|
-| Windows Server 2008 R2 Enterprise|Yes| Yes| Executable
Windows Installer
Script
DLL| Packaged app rules won't be enforced.|
-| Windows Server 2008 R2 Datacenter| Yes| Yes| Executable
Windows Installer
Script
DLL| Packaged app rules won't be enforced.|
-| Windows Server 2008 R2 for Itanium-Based Systems| Yes| Yes| Executable
Windows Installer
Script
DLL| Packaged app rules won't be enforced.|
-| Windows 7 Ultimate| Yes| Yes| Executable
Windows Installer
Script
DLL| Packaged app rules won't be enforced.|
-| Windows 7 Enterprise| Yes| Yes| Executable
Windows Installer
Script
DLL| Packaged app rules won't be enforced.|
-| Windows 7 Professional| Yes| No| Executable
Windows Installer
Script
DLL| No AppLocker rules are enforced.|
-
+| --- | --- | --- | --- | --- |
+| Windows 10 and Windows 11 | Yes | Yes | Packaged apps
Executable
Windows Installer
Script
DLL | Policies are supported on all editions Windows 10 version 2004 and newer with [KB 5024351](https://support.microsoft.com/help/5024351).
Windows versions older than version 2004, including Windows Server 2019:
- Policies deployed through GP are only supported on Enterprise and Server editions.
- Policies deployed through MDM are supported on all editions.
|
+| Windows Server 2019
Windows Server 2016
Windows Server 2012 R2 | Yes | Yes | Packaged apps
Executable
Windows Installer
Script
DLL| |
+| Windows 8.1 Pro | Yes | No | N/A | |
+| Windows 8.1 Enterprise | Yes | Yes | Packaged apps
Executable
Windows Installer
Script
DLL | |
-AppLocker isn't supported on versions of the Windows operating system not listed above. Software Restriction Policies can be used with those versions. However, the SRP Basic User feature isn't supported on the above operating systems.
-
->[!NOTE]
->You can use Software Restriction Policies with AppLocker, but with some limitations. For more info, see [Use AppLocker and Software Restriction Policies in the same domain](use-applocker-and-software-restriction-policies-in-the-same-domain.md).
+AppLocker isn't supported on versions of the Windows operating system not listed in the preceding table.
## See also
+
- [Administer AppLocker](administer-applocker.md)
- [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md)
- [Optimize AppLocker performance](optimize-applocker-performance.md)
-- [Use AppLocker and Software Restriction Policies in the same domain](use-applocker-and-software-restriction-policies-in-the-same-domain.md)
- [Manage packaged apps with AppLocker](manage-packaged-apps-with-applocker.md)
- [AppLocker Design Guide](applocker-policies-design-guide.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/what-is-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/what-is-applocker.md
index e976eb85b8..256c416dbf 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/what-is-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/what-is-applocker.md
@@ -1,68 +1,31 @@
---
title: What Is AppLocker
-description: This topic for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies.
+description: This article for the IT professional describes what AppLocker is.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# What Is AppLocker?
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article for the IT professional describes what AppLocker is.
-This topic for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies.
+Windows includes two technologies that can be used for application control, depending on your organization's specific scenarios and requirements: Windows Defender Application Control (WDAC) and AppLocker. For information to help you choose when to use WDAC or AppLocker, see [WDAC and AppLocker overview](/windows/security/application-security/application-control/windows-defender-application-control/wdac-and-applocker-overview).
-AppLocker advances the app control features and functionality of Software Restriction Policies. AppLocker contains new capabilities and extensions that allow you to create rules to allow or deny apps from running based on unique identities of files and to specify which users or groups can run those apps.
+AppLocker helps you create rules to allow or deny apps from running based on information about the apps' files. You can also use AppLocker to control which users or groups can run those apps.
Using AppLocker, you can:
-- Control the following types of apps: executable files (.exe and .com), scripts (.js, .ps1, .vbs, .cmd, and .bat), Windows Installer files (.mst, .msi and .msp), and DLL files (.dll and .ocx), and packaged apps and packaged app installers (appx).
-- Define rules based on file attributes derived from the digital signature, including the publisher, product name, file name, and file version. For example, you can create rules based on the publisher attribute that is persistent through updates, or you can create rules for a specific version of a file.
-- Assign a rule to a security group or an individual user.
-- Create exceptions to rules. For example, you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
-- Use audit-only mode to deploy the policy and understand its impact before enforcing it.
-- Import and export rules. The import and export affects the entire policy. For example, if you export a policy, all of the rules from all of the rule collections are exported, including the enforcement settings for the rule collections. If you import a policy, all criteria in the existing policy are overwritten.
-- Streamline creating and managing AppLocker rules by using Windows PowerShell cmdlets.
-
-AppLocker helps reduce administrative overhead and helps reduce the organization's cost of managing computing resources by decreasing the number of help desk calls that result from users running unapproved apps
+- Control the following types of apps and files: executable files (.exe and .com), scripts (.js, .ps1, .vbs, .cmd, and .bat), Windows Installer files (.mst, .msi and .msp), and DLL files (.dll and .ocx), and packaged apps and packaged app installers (appx).
+- Define rules based on file attributes derived from the digital signature, including the publisher, product name, file name, and file version. For example, you can create rules based on the publisher attribute that is persistent through updates, or you can create rules for a specific version of a file.
+- Assign a rule to a security group or an individual user.
+- Create exceptions to rules. For example, you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
+- Use audit-only mode to deploy the policy and understand its effect before enforcing it.
+- Import and export rules. The import and export affects the entire policy. For example, if you export a policy, all of the rules from all of the rule collections are exported, including the enforcement settings for the rule collections. If you import a policy, all criteria in the existing policy are overwritten.
+- Streamline creating and managing AppLocker rules by using Windows PowerShell cmdlets.
For information about the application control scenarios that AppLocker addresses, see [AppLocker policy use scenarios](applocker-policy-use-scenarios.md).
-## What features are different between Software Restriction Policies and AppLocker?
-
-**Feature differences**
-
-The following table compares AppLocker to Software Restriction Policies.
-
-|Feature|Software Restriction Policies|AppLocker|
-|--- |--- |--- |
-|Rule scope|All users|Specific user or group|
-|Rule conditions provided|File hash, path, certificate, registry path, and Internet zone|File hash, path, and publisher|
-|Rule types provided|Defined by the security levels:DisallowedBasic UserUnrestricted|Allow and deny|
-|Default rule action|Unrestricted|Implicit deny|
-|Audit-only mode|No|Yes|
-|Wizard to create multiple rules at one time|No|Yes|
-|Policy import or export|No|Yes|
-|Rule collection|No|Yes|
-|Windows PowerShell support|No|Yes|
-|Custom error messages|No|Yes|
-
-Application control function differences
-
-The following table compares the application control functions of Software Restriction Policies (SRP) and AppLocker.
-
-|Application control function|SRP|AppLocker|
-|--- |--- |--- |
-|Operating system scope|SRP policies can be applied to all Windows operating systems beginning with Windows XP and Windows Server 2003.|AppLocker policies apply only to those supported operating system versions and editions listed in [Requirements to use AppLocker](requirements-to-use-applocker.md). But these systems can also use SRP.**Note:** Use different GPOs for SRP and AppLocker rules.
|
-|User support|SRP allows users to install applications as an administrator.|AppLocker policies are maintained through Group Policy, and only the administrator of the device can update an AppLocker policy.AppLocker permits customization of error messages to direct users to a Web page for help.|
-|Policy maintenance|SRP policies are updated by using the Local Security Policy snap-in or the Group Policy Management Console (GPMC).|AppLocker policies are updated by using the Local Security Policy snap-in or the GPMC.
AppLocker supports a small set of PowerShell cmdlets to aid in administration and maintenance.|
-|Policy management infrastructure|To manage SRP policies, SRP uses Group Policy within a domain and the Local Security Policy snap-in for a local computer.|To manage AppLocker policies, AppLocker uses Group Policy within a domain and the Local Security Policy snap-in for a local computer.|
-|Block malicious scripts|Rules for blocking malicious scripts prevent all scripts associated with the Windows Script Host from running, except those scripts that are digitally signed by your organization.|AppLocker rules can control the following file formats: .ps1, .bat, .cmd, .vbs, and .js. In addition, you can set exceptions to allow specific files to run.|
-|Manage software installation|SRP can prevent all Windows Installer packages from installing. It allows .msi files that are digitally signed by your organization to be installed.|The Windows Installer rule collection is a set of rules created for Windows Installer file types (.mst, .msi and .msp) to allow you to control the installation of files on client computers and servers.|
-|Manage all software on the computer|All software is managed in one rule set. By default, the policy for managing all software on a device disallows all software on the user's device, except software that is installed in the Windows folder, Program Files folder, or subfolders.|Unlike SRP, each AppLocker rule collection functions as an allowed list of files. Only the files that are listed within the rule collection will be allowed to run. This configuration makes it easier for administrators to determine what will occur when an AppLocker rule is applied.|
-|Different policies for different users|Rules are applied uniformly to all users on a particular device.|On a device that is shared by multiple users, an administrator can specify the groups of users who can access the installed software. An administrator uses AppLocker to specify the user to whom a specific rule should apply.|
-
-## Related topics
+## Related articles
- [AppLocker technical reference](applocker-technical-reference.md)
From 71009b7741780af8177c6ddbdb4c40efbf49a65c Mon Sep 17 00:00:00 2001
From: jsuther1974
Date: Sat, 23 Dec 2023 11:23:54 -0800
Subject: [PATCH 5/7] Reviewed AppLocker articles for accuracy and fixed
acrolinx and readability issues
---
.../applocker-architecture-and-components.md | 27 +++---
.../applocker/applocker-functions.md | 49 +++++------
.../applocker-processes-and-interactions.md | 86 +++++++++----------
.../applocker/dll-rules-in-applocker.md | 33 ++++---
.../executable-rules-in-applocker.md | 23 +++--
.../applocker/how-applocker-works-techref.md | 53 ++++++------
...ckaged-app-installer-rules-in-applocker.md | 30 +++----
.../applocker/rule-collection-extensions.md | 4 +-
.../applocker/script-rules-in-applocker.md | 8 +-
.../security-considerations-for-applocker.md | 30 +++----
...plocker-allow-and-deny-actions-on-rules.md | 30 +++----
.../understanding-applocker-default-rules.md | 40 ++++-----
.../understanding-applocker-rule-behavior.md | 22 +++--
...nderstanding-applocker-rule-collections.md | 30 +++----
...standing-applocker-rule-condition-types.md | 51 +++++------
...understanding-applocker-rule-exceptions.md | 15 ++--
...e-file-hash-rule-condition-in-applocker.md | 21 ++---
...ng-the-path-rule-condition-in-applocker.md | 23 +++--
...e-publisher-rule-condition-in-applocker.md | 61 ++++++-------
19 files changed, 286 insertions(+), 350 deletions(-)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-architecture-and-components.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-architecture-and-components.md
index 93e671aff7..763fd8e86d 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-architecture-and-components.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-architecture-and-components.md
@@ -1,34 +1,31 @@
---
title: AppLocker architecture and components
-description: This topic for IT professional describes AppLocker’s basic architecture and its major components.
+description: This article for IT professional describes AppLocker’s basic architecture and its major components.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# AppLocker architecture and components
-> [!NOTE]
-> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article for IT professional describes AppLocker's basic architecture and its major components.
-This topic for IT professional describes AppLocker's basic architecture and its major components.
+AppLocker uses the Application Identity service to provide attributes for a file and to evaluate the AppLocker policy for the file. AppLocker policies are conditional access control entries (ACEs), and policies are evaluated by using the attribute-based access control **SeAccessCheckWithSecurityAttributes** or **AuthzAccessCheck** functions.
-AppLocker relies on the Application Identity service to provide attributes for a file and to evaluate the AppLocker policy for the file. AppLocker policies are conditional access control entries (ACEs), and policies are evaluated by using the attribute-based access control **SeAccessCheckWithSecurityAttributes** or **AuthzAccessCheck** functions.
+AppLocker provides three ways to intercept and validate if a file is allowed to run according to an AppLocker policy.
-AppLocker provides three ways to intercept and validate if a file is allowed to execute according to an AppLocker policy.
+## A new process is created
-**A new process is created**
+When an app file is run, a new process is created. When that happens, AppLocker calls the Application Identity component to calculate the attributes of the main executable file used to create a new process. It then updates the new process's token with these attributes and checks the AppLocker policy to verify that the executable file is allowed to run.
-When a new process is created, such as an executable file or a Universal Windows app is run, AppLocker invokes the Application Identity component to calculate the attributes of the main executable file used to create a new process. It then updates the new process's token with these attributes and checks the AppLocker policy to verify that the executable file is allowed to run.
+## A DLL is loaded
-**A DLL is loaded**
+When a DLL is loaded, a notification is sent to AppLocker to verify that the DLL is allowed to load. AppLocker calls the Application Identity component to calculate the file attributes. It duplicates the existing process token and replaces those Application Identity attributes in the duplicated token with attributes of the loaded DLL. AppLocker then evaluates the policy for this DLL, and the duplicated token is discarded. Depending on the result of this check, the system either continues to load the DLL or stops the process.
-When a new DLL loads, a notification is sent to AppLocker to verify that the DLL is allowed to load. AppLocker calls the Application Identity component to calculate the file attributes. It duplicates the existing process token and replaces those Application Identity attributes in the duplicated token with attributes of the loaded DLL. AppLocker then evaluates the policy for this DLL, and the duplicated token is discarded. Depending on the result of this check, the system either continues to load the DLL or stops the process.
+## A script is run
-**A script is run**
+Before a script file is run, the script host (for example, PowerShell) calls AppLocker to verify the script. AppLocker calls the Application Identity component in user-mode with the file name or file handle to calculate the file properties. The script file then is evaluated against the AppLocker policy to verify that it should run. In each case, the actions taken by AppLocker are written to the event log.
-Before a script file is run, the script host (for example, for .ps1 files, the script host is PowerShell) invokes AppLocker to verify the script. AppLocker invokes the Application Identity component in user-mode with the file name or file handle to calculate the file properties. The script file then is evaluated against the AppLocker policy to verify that it's allowed to run. In each case, the actions taken by AppLocker are written to the event log.
-
-## Related topics
+## Related articles
- [AppLocker technical reference](applocker-technical-reference.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-functions.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-functions.md
index 48067e47b9..8ab68a0205 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-functions.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-functions.md
@@ -1,45 +1,40 @@
---
title: AppLocker functions
-description: This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.
+description: This article for the IT professional lists the functions and security levels for AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# AppLocker functions
-> [!NOTE]
-> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.
+This article for the IT professional lists the functions and security levels for AppLocker.
## Functions
-Here are the SRP functions beginning with Windows Server 2003 and AppLocker functions beginning with Windows Server 2008 R2:
-
-- [SaferGetPolicyInformation Function](/windows/win32/api/winsafer/nf-winsafer-safergetpolicyinformation)
-- [SaferCreateLevel Function](/windows/win32/api/winsafer/nf-winsafer-safercreatelevel)
-- [SaferCloseLevel Function](/windows/win32/api/winsafer/nf-winsafer-safercloselevel)
-- [SaferIdentifyLevel Function](/windows/win32/api/winsafer/nf-winsafer-saferidentifylevel)
-- [SaferComputeTokenFromLevel Function](/windows/win32/api/winsafer/nf-winsafer-safercomputetokenfromlevel)
-- [SaferGetLevelInformation Function](/windows/win32/api/winsafer/nf-winsafer-safergetlevelinformation)
-- [SaferRecordEventLogEntry Function](/windows/win32/api/winsafer/nf-winsafer-saferrecordeventlogentry)
-- [SaferiIsExecutableFileType Function](/windows/win32/api/winsafer/nf-winsafer-saferiisexecutablefiletype)
+- [SaferGetPolicyInformation Function](/windows/win32/api/winsafer/nf-winsafer-safergetpolicyinformation)
+- [SaferCreateLevel Function](/windows/win32/api/winsafer/nf-winsafer-safercreatelevel)
+- [SaferCloseLevel Function](/windows/win32/api/winsafer/nf-winsafer-safercloselevel)
+- [SaferIdentifyLevel Function](/windows/win32/api/winsafer/nf-winsafer-saferidentifylevel)
+- [SaferComputeTokenFromLevel Function](/windows/win32/api/winsafer/nf-winsafer-safercomputetokenfromlevel)
+- [SaferGetLevelInformation Function](/windows/win32/api/winsafer/nf-winsafer-safergetlevelinformation)
+- [SaferRecordEventLogEntry Function](/windows/win32/api/winsafer/nf-winsafer-saferrecordeventlogentry)
+- [SaferiIsExecutableFileType Function](/windows/win32/api/winsafer/nf-winsafer-saferiisexecutablefiletype)
## Security level ID
-AppLocker and SRP use the security level IDs to specify the access requirements to files listed in policies. The following table shows those security levels supported in SRP and AppLocker.
+AppLocker uses the security level IDs to specify the access requirements to files listed in policies. The following table shows those security levels supported in AppLocker.
-| Security level ID | SRP | AppLocker |
-| - | - | - |
-| SAFER_LEVELID_FULLYTRUSTED | Supported | Supported |
-| SAFER_LEVELID_NORMALUSER | Supported | Not supported |
-| SAFER_LEVELID_CONSTRAINED | Supported | Not supported |
-| SAFER_LEVELID_UNTRUSTED | Supported | Not supported |
-| SAFER_LEVELID_DISALLOWED | Supported | Supported |
-
->[!Note]
->URL zone ID isn't supported in AppLocker.
+| Security level ID | AppLocker |
+| --- | --- |
+| SAFER_LEVELID_FULLYTRUSTED | Supported |
+| SAFER_LEVELID_NORMALUSER | Not supported |
+| SAFER_LEVELID_CONSTRAINED | Not supported |
+| SAFER_LEVELID_UNTRUSTED | Not supported |
+| SAFER_LEVELID_DISALLOWED | Supported |
+
+> [!NOTE]
+> URL zone ID isn't supported in AppLocker.
## Related articles
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-processes-and-interactions.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-processes-and-interactions.md
index 567b3bafc5..36cd302f29 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-processes-and-interactions.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-processes-and-interactions.md
@@ -1,9 +1,9 @@
---
title: AppLocker processes and interactions
-description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
+description: This article for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# AppLocker processes and interactions
@@ -11,85 +11,85 @@ ms.date: 09/21/2017
> [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
+This article for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
-## How policies are implemented by AppLocker
+## How AppLocker applies policies
-AppLocker policies are collections of AppLocker rules that might contain any one of the enforcement settings configured. When applied, each rule is evaluated within the policy and the collection of rules is applied according to the enforcement setting and according to your Group Policy structure.
+AppLocker policies are collections of rules that might contain any one of the enforcement mode settings configured. When applied, each rule is evaluated within the policy and the collection of rules is applied according to the enforcement setting and according to your Group Policy structure.
-The AppLocker policy is enforced on a computer through the Application Identity service, which is the engine that evaluates the policies. If the service isn't running, policies won't be enforced. The Application Identity service returns the information from the binary -even if product or binary names are empty- to the results pane of the Local Security Policy snap-in.
+The AppLocker policy is enforced on a computer through the Application Identity service (appid.sys), which is the engine that evaluates the policies and runs within the Windows kernel. If the service isn't running, policies aren't enforced. The Application Identity service returns the information from the binary -even if product or binary names are empty- to the results pane of the Local Security Policy snap-in.
AppLocker policies are stored in a security descriptor format according to Application Identity service requirements. It uses file path, hash, or fully qualified binary name attributes to form allow or deny actions on a rule. Each rule is stored as an access control entry (ACE) in the security descriptor and contains the following information:
-- Either an allow or a deny ACE ("XA" or "XD" in security descriptor definition language (SDDL) form).
-- The user security identifier (SID) that this rule is applicable to. (The default is the authenticated user SID, or "AU" in SDDL.)
-- The rule condition containing the **appid** attributes.
+- Either an allow or a deny ACE ("XA" or "XD" in security descriptor definition language (SDDL) form).
+- The user security identifier (SID) that this rule is applicable to. (The default is the authenticated user SID in SDDL.)
+- The rule condition containing the **appid** attributes.
-For example, an SDDL for a rule that allows all files in the %windir% directory to run uses the following format: XA;;FX;;;AU;(APPID://PATH == "%windir%\\\*").
+For example, an SDDL for a rule that allows all files in the %windir% directory to run uses the following format: `XA;;FX;;;AU;(APPID://PATH == "%windir%\\\*")`.
-An AppLocker policy for DLLs and executable files is read and cached by kernel mode code, which is part of appid.sys. Whenever a new policy is applied, appid.sys is notified by a policy converter task. For other file types, the AppLocker policy is read every time a **SaferIdentifyLevel** call is made.
+Appid.sys reads and caches the effective AppLocker policy for DLLs and executable files. Whenever a new policy is applied, a policy converter task notifies appid.sys. For other file types, the AppLocker policy is read every time a **SaferIdentifyLevel** call is made.
-### Understanding AppLocker rules
+## Understanding AppLocker rules
-An AppLocker rule is a control placed on a file to govern whether or not it's allowed to run for a specific user or group. Rules apply to five different types, or collections, of files:
+An AppLocker rule is a control placed on a file that controls whether or not it runs for a specific user or group. You create AppLocker rules for five different types of files, or collections:
-- An executable rule controls whether a user or group can run an executable file. Executable files most often have the .exe or .com file name extensions and apply to applications.
-- A script rule controls whether a user or group can run scripts with a file name extension of .ps1, .bat, .cmd, .vbs, and .js.
-- A Windows Installer rule controls whether a user or group can run files with a file name extension of .msi, .mst and .msp (Windows Installer patch).
-- A DLL rule controls whether a user or group can run files with a file name extension of .dll and .ocx.
-- A packaged app and packaged app installer rule controls whether a user or group can run or install a packaged app. A Packaged app installer has the .appx extension.
+- An executable rule controls whether a user or group can run an executable file. Executable files most often have the .exe or .com file name extensions and apply to applications.
+- A script rule controls whether a user or group can run scripts with a file name extension of .ps1, .bat, .cmd, .vbs, and .js.
+- A Windows Installer rule controls whether a user or group can run files with a file name extension of .msi, .mst and .msp (Windows Installer patch).
+- A DLL rule controls whether a user or group can run files with a file name extension of .dll and .ocx.
+- A packaged app and packaged app installer rule controls whether a user or group can run or install a packaged app. A Packaged app installer has the .appx extension.
There are three different types of conditions that can be applied to rules:
-- A publisher condition on a rule controls whether a user or group can run files from a specific software publisher. The file must be signed.
-- A path condition on a rule controls whether a user or group can run files from within a specific directory or its subdirectories.
-- A file hash condition on a rule controls whether a user or group can run files with matching encrypted hashes.
+- A publisher condition on a rule controls whether a user or group can run files from a specific software publisher. The file must be signed.
+- A path condition on a rule controls whether a user or group can run files from within a specific directory or its subdirectories.
+- A file hash condition on a rule controls whether a user or group can run files with matching encrypted hashes.
-- [Understanding AppLocker rule collections](understanding-applocker-rule-collections.md)
+- [Understanding AppLocker rule collections](understanding-applocker-rule-collections.md)
An AppLocker rule collection is a set of rules that apply to one of the following types: executable files, Windows Installer files, scripts, DLLs, and packaged apps.
-- [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md)
+- [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md)
Rule conditions are criteria that the AppLocker rule is based on. Primary conditions are required to create an AppLocker rule. The three primary rule conditions are publisher, path, and file hash.
- - [Understanding the publisher rule condition in AppLocker](understanding-the-publisher-rule-condition-in-applocker.md)
- - [Understanding the path rule condition in AppLocker](understanding-the-path-rule-condition-in-applocker.md)
- - [Understanding the file hash rule condition in AppLocker](understanding-the-file-hash-rule-condition-in-applocker.md)
-- [Understanding AppLocker default rules](understanding-applocker-default-rules.md)
+ - [Understanding the publisher rule condition in AppLocker](understanding-the-publisher-rule-condition-in-applocker.md)
+ - [Understanding the path rule condition in AppLocker](understanding-the-path-rule-condition-in-applocker.md)
+ - [Understanding the file hash rule condition in AppLocker](understanding-the-file-hash-rule-condition-in-applocker.md)
+- [Understanding AppLocker default rules](understanding-applocker-default-rules.md)
AppLocker includes default rules for each rule collection. These rules are intended to help ensure that the files that are required for Windows to operate properly are allowed in an AppLocker rule collection.
- - [Executable rules in AppLocker](executable-rules-in-applocker.md)
- - [Windows Installer rules in AppLocker](windows-installer-rules-in-applocker.md)
- - [Script rules in AppLocker](script-rules-in-applocker.md)
- - [DLL rules in AppLocker](dll-rules-in-applocker.md)
- - [Packaged apps and packaged app installer rules in AppLocker](packaged-apps-and-packaged-app-installer-rules-in-applocker.md)
-- [Understanding AppLocker rule exceptions](understanding-applocker-rule-exceptions.md)
+ - [Executable rules in AppLocker](executable-rules-in-applocker.md)
+ - [Windows Installer rules in AppLocker](windows-installer-rules-in-applocker.md)
+ - [Script rules in AppLocker](script-rules-in-applocker.md)
+ - [DLL rules in AppLocker](dll-rules-in-applocker.md)
+ - [Packaged apps and packaged app installer rules in AppLocker](packaged-apps-and-packaged-app-installer-rules-in-applocker.md)
+- [Understanding AppLocker rule exceptions](understanding-applocker-rule-exceptions.md)
- You can apply AppLocker rules to individual users or a group of users. If you apply a rule to a group of users, all users in that group are affected by that rule. If you need to allow only a subset of a user group to use an application, you can create a special rule for that subset.
+ You can apply AppLocker rules to individual users or a group of users. If you apply a rule to a group of users, the rule affects all users in that group. If you need to allow only a subset of a user group to use an application, you can create a special rule for that subset.
-- [Understanding AppLocker rule behavior](understanding-applocker-rule-behavior.md) and [Understanding AppLocker allow and deny actions on Rules](understanding-applocker-allow-and-deny-actions-on-rules.md)
+- [Understanding AppLocker rule behavior](understanding-applocker-rule-behavior.md) and [Understanding AppLocker allow and deny actions on Rules](understanding-applocker-allow-and-deny-actions-on-rules.md)
Each AppLocker rule collection functions as an allowed list of files.
-### Understanding AppLocker policies
+## Understanding AppLocker policies
-An AppLocker policy is a set of rule collections and their corresponding configured enforcement settings that have been applied to one or more computers.
+An AppLocker policy is a set of rule collections and their corresponding configured enforcement mode settings applied to one or more computers.
-- [Understand AppLocker enforcement settings](understand-applocker-enforcement-settings.md)
+- [Understand AppLocker enforcement settings](understand-applocker-enforcement-settings.md)
Rule enforcement is applied only to collections of rules, not individual rules. AppLocker divides the rules into four collections: executable files, Windows Installer files, scripts, and DLL files. The options for rule enforcement are **Not configured**, **Enforce rules**, or **Audit only**. Together, all AppLocker rule collections compose the application control policy, or AppLocker policy. By default, if enforcement isn't configured and rules are present in a rule collection, those rules are enforced.
-### Understanding AppLocker and Group Policy
+## Understanding AppLocker and Group Policy
Group Policy can be used to create, modify, and distribute AppLocker policies in separate objects or in combination with other policies.
-- [Understand AppLocker rules and enforcement setting inheritance in Group Policy](understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md)
+- [Understand AppLocker rules and enforcement setting inheritance in Group Policy](understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md)
- When Group Policy is used to distribute AppLocker policies, rule collections that aren't configured will be enforced. Group Policy doesn't overwrite or replace rules that are already present in a linked Group Policy Object (GPO) and applies the AppLocker rules in addition to existing rules.
- AppLocker processes the explicit deny rule configuration before the allow rule configuration, and for rule enforcement, the last write to the GPO is applied.
+ When Group Policy is used to distribute AppLocker policies, rule collections containing one or more rules are enforced unless the enforcement mode is set to **Audit only**. Group Policy doesn't overwrite or replace rules that are already present in a linked Group Policy Object (GPO) and applies the AppLocker rules in addition to existing rules.
+ AppLocker processes explicit deny rules before any allow rules, and for rule enforcement, the last write to the GPO is applied.
-## Related topics
+## Related articles
- [AppLocker technical reference](applocker-technical-reference.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/dll-rules-in-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/dll-rules-in-applocker.md
index 39003c7034..36da65e276 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/dll-rules-in-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/dll-rules-in-applocker.md
@@ -1,37 +1,34 @@
---
title: DLL rules in AppLocker
-description: This topic describes the file formats and available default rules for the DLL rule collection.
+description: This article describes the file formats and available default rules for the DLL rule collection.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# DLL rules in AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic describes the file formats and available default rules for the DLL rule collection.
+This article describes the file formats and available default rules for the DLL rule collection.
AppLocker defines DLL rules to include only the following file formats:
-- .dll
-- .ocx
+- .dll
+- .ocx
+
+> [!IMPORTANT]
+> If you use DLL rules, a DLL allow rule has to be created for each DLL that is used by all of the allowed apps, including Windows system files.
The following table lists the default rules that are available for the DLL rule collection.
| Purpose | Name | User | Rule condition type |
-| - | - | - | - |
-| Allows members of the local Administrators group to run all DLLs | (Default Rule) All DLLs| BUILTIN\Administrators | Path: *|
-| Allow all users to run DLLs in the Windows folder| (Default Rule) Microsoft Windows DLLs | Everyone | Path: %windir%\*|
-| Allow all users to run DLLs in the Program Files folder | (Default Rule) All DLLs located in the Program Files folder| Everyone | Path: %programfiles%\*|
-
-> [!IMPORTANT]
-> If you use DLL rules, a DLL allow rule has to be created for each DLL that is used by all of the allowed apps
+| --- | --- | --- | --- |
+| Allows members of the local Administrators group to run all DLLs | (Default Rule) All DLLs | BUILTIN\Administrators | Path: * |
+| Allow all users to run DLLs in the Windows folder | (Default Rule) Microsoft Windows DLLs | Everyone | Path: %windir%\* |
+| Allow all users to run DLLs in the Program Files folder | (Default Rule) All DLLs located in the Program Files folder | Everyone | Path: %programfiles%\* |
> [!CAUTION]
-> When DLL rules are used, AppLocker must check each DLL that an app loads. Therefore, users may experience a reduction in performance if DLL rules are used.
-
-## Related topics
+> When DLL rules are used, AppLocker must check each DLL that an app loads. Therefore, users may experience a reduction in performance if DLL rules are used on computers that are resource constrained.
+
+## Related articles
- [Understanding AppLocker default rules](understanding-applocker-default-rules.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/executable-rules-in-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/executable-rules-in-applocker.md
index 4e0d5303e8..e90dc2b98e 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/executable-rules-in-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/executable-rules-in-applocker.md
@@ -1,26 +1,23 @@
---
title: Executable rules in AppLocker
-description: This topic describes the file formats and available default rules for the executable rule collection.
+description: This article describes the file formats and available default rules for the executable rule collection.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Executable rules in AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article describes the file formats and available default rules for the executable rule collection.
-This topic describes the file formats and available default rules for the executable rule collection.
-
-AppLocker defines executable rules as any files with the .exe and .com extensions that are associated with an app. Because all of the default rules for the executable rule collection are based on folder paths, all files under those paths will be allowed. The following table lists the default rules that are available for the executable rule collection.
+AppLocker executable rules conceptually apply to files with the .exe and .com extensions that are associated with an app. However, AppLocker executable rules actually apply to any portable executable (PE) file, regardless of the file's extension. Because all of the default rules for the executable rule collection are based on folder paths, all files under those paths can run. The following table lists the default rules that are available for the executable rule collection.
| Purpose | Name | User | Rule condition type |
-| - | - | - | - |
-| Allow members of the local Administrators group access to run all executable files | (Default Rule) All files| BUILTIN\Administrators | Path: * |
-| Allow all users to run executable files in the Windows folder| (Default Rule) All files located in the Windows folder| Everyone| Path: %windir%\*|
-| Allow all users to run executable files in the Program Files folder | (Default Rule) All files located in the Program Files folder| Everyone | Path: %programfiles%\*|
-
-## Related topics
+| --- | --- | --- | --- |
+| Allow members of the local Administrators group access to run all executable files | (Default Rule) All files | BUILTIN\Administrators | Path: * |
+| Allow all users to run executable files in the Windows folder| (Default Rule) All files located in the Windows folder | Everyone| Path: %windir%\* |
+| Allow all users to run executable files in the Program Files folder | (Default Rule) All files located in the Program Files folder| Everyone | Path: %programfiles%\* |
+
+## Related articles
- [Understanding AppLocker Default Rules](understanding-applocker-default-rules.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/how-applocker-works-techref.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/how-applocker-works-techref.md
index b05b76c318..b2f3e10097 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/how-applocker-works-techref.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/how-applocker-works-techref.md
@@ -1,45 +1,42 @@
---
title: How AppLocker works
-description: This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies.
+description: This article for the IT professional provides links to articles about AppLocker architecture and components, processes and interactions, rules and policies.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# How AppLocker works
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article for the IT professional provides links to articles about AppLocker architecture and components, processes and interactions, rules and policies.
-This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies.
+The following articles explain how AppLocker policies for each of the rule condition types are evaluated:
-The following topics explain how AppLocker policies for each of the rule condition types are evaluated:
+- [AppLocker architecture and components](applocker-architecture-and-components.md)
+- [AppLocker processes and interactions](applocker-processes-and-interactions.md)
-- [AppLocker architecture and components](applocker-architecture-and-components.md)
-- [AppLocker processes and interactions](applocker-processes-and-interactions.md)
+The following articles explain how AppLocker rules and policies work:
-The following topics explain how AppLocker rules and policies work:
+- [Understanding AppLocker rule behavior](understanding-applocker-rule-behavior.md)
+- [Understanding AppLocker rule exceptions](understanding-applocker-rule-exceptions.md)
+- [Understanding AppLocker rule collections](understanding-applocker-rule-collections.md)
+- [Understanding AppLocker allow and deny actions on rules](understanding-applocker-allow-and-deny-actions-on-rules.md)
+- [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md)
-- [Understanding AppLocker rule behavior](understanding-applocker-rule-behavior.md)
-- [Understanding AppLocker rule exceptions](understanding-applocker-rule-exceptions.md)
-- [Understanding AppLocker rule collections](understanding-applocker-rule-collections.md)
-- [Understanding AppLocker allow and deny actions on rules](understanding-applocker-allow-and-deny-actions-on-rules.md)
-- [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md)
+ - [Understanding the publisher rule condition in AppLocker](understanding-the-publisher-rule-condition-in-applocker.md)
+ - [Understanding the path rule condition in AppLocker](understanding-the-path-rule-condition-in-applocker.md)
+ - [Understanding the file hash rule condition in AppLocker](understanding-the-file-hash-rule-condition-in-applocker.md)
- - [Understanding the publisher rule condition in AppLocker](understanding-the-publisher-rule-condition-in-applocker.md)
- - [Understanding the path rule condition in AppLocker](understanding-the-path-rule-condition-in-applocker.md)
- - [Understanding the file hash rule condition in AppLocker](understanding-the-file-hash-rule-condition-in-applocker.md)
+- [Understanding AppLocker default rules](understanding-applocker-default-rules.md)
-- [Understanding AppLocker default rules](understanding-applocker-default-rules.md)
+ - [Executable rules in AppLocker](executable-rules-in-applocker.md)
+ - [Windows Installer rules in AppLocker](windows-installer-rules-in-applocker.md)
+ - [Script rules in AppLocker](script-rules-in-applocker.md)
+ - [DLL rules in AppLocker](dll-rules-in-applocker.md)
+ - [Packaged apps and packaged app installer rules in AppLocker](packaged-apps-and-packaged-app-installer-rules-in-applocker.md)
- - [Executable rules in AppLocker](executable-rules-in-applocker.md)
- - [Windows Installer rules in AppLocker](windows-installer-rules-in-applocker.md)
- - [Script rules in AppLocker](script-rules-in-applocker.md)
- - [DLL rules in AppLocker](dll-rules-in-applocker.md)
- - [Packaged apps and packaged app installer rules in AppLocker](packaged-apps-and-packaged-app-installer-rules-in-applocker.md)
+## More resources
-## Additional resources
-
-- [AppLocker Design Guide](applocker-policies-design-guide.md)
-- [AppLocker deployment guide](applocker-policies-deployment-guide.md)
-- [Administer AppLocker](administer-applocker.md)
+- [AppLocker Design Guide](applocker-policies-design-guide.md)
+- [AppLocker deployment guide](applocker-policies-deployment-guide.md)
+- [Administer AppLocker](administer-applocker.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md
index 92d016a3dc..d084a76681 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md
@@ -1,30 +1,26 @@
---
title: Packaged apps and packaged app installer rules in AppLocker
-description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps.
+description: This article explains the AppLocker rule collection for packaged app installers and packaged apps.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 10/13/2017
+ms.date: 12/23/2023
---
# Packaged apps and packaged app installer rules in AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article explains the AppLocker rule collection for packaged app installers and packaged apps.
-This topic explains the AppLocker rule collection for packaged app installers and packaged apps.
+Packaged apps can be installed through the Microsoft Store or can be sideloaded using the Windows PowerShell cmdlets. Standard users can install packaged apps unlike some Classic Windows applications that sometimes require administrative privileges for installation. Typically, an app consists of multiple components - the installer used to install the app and one or more exes, dlls or scripts. With Classic Windows applications, those components often don't share common attributes such as the publisher name, product name and product version. Therefore, AppLocker has to control each of these components separately through different rule collections - exe, dll, script and Windows Installers. In contrast, all the components of a Packaged app share the same attributes: Publisher name, Package name and Package version. It's therefore possible to control an entire app with a single rule.
-Universal Windows apps can be installed through the Microsoft Store or can be sideloaded using the Windows PowerShell cmdlets. Universal Windows apps can be installed by a standard user unlike some Classic Windows applications that sometimes require administrative privileges for installation.
-Typically, an app consists of multiple components - the installer used to install the app and one or more exes, dlls or scripts. With Classic Windows applications, not all those components always share common attributes such as the publisher name, product name and product version. Therefore, AppLocker has to control each of these components separately through different rule collections - exe, dll, script and Windows Installers. In contrast, all the components of a Universal Windows app share the same attributes: Publisher name, Package name and Package version. It's therefore possible to control an entire app with a single rule.
+AppLocker enforces rules for Packaged apps separately from Classic Windows applications. A single AppLocker rule for a Packaged app can control both the installation and the running of an app. Because all Packaged apps are signed, AppLocker supports only publisher rules for Packaged apps. A publisher rule for a Packaged app is based on the following attributes of the app:
-AppLocker enforces rules for Universal Windows apps separately from Classic Windows applications. A single AppLocker rule for a Universal Windows app can control both the installation and the running of an app. Because all Universal Windows apps are signed, AppLocker supports only publisher rules for Universal Windows apps. A publisher rule for a Universal Windows app is based on the following attributes of the app:
+- Publisher name
+- Package name
+- Package version
-- Publisher name
-- Package name
-- Package version
+In summary, including AppLocker rules for Packaged apps in your policy design provides:
-In summary, including AppLocker rules for Universal Windows apps in your policy design provides:
-
-- The ability to control the installation and running of the app
-- The ability to control all the components of the app with a single rule rather than controlling individual binaries within the app
-- The ability to create application control policies that survive app updates
-- Management of Universal Windows apps through Group Policy.
+- The ability to control the installation and running of the app.
+- The ability to control all the components of the app with a single rule rather than controlling individual binaries within the app.
+- The ability to create application control policies that survive app updates.
+- Management of Packaged apps through Group Policy.
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/rule-collection-extensions.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/rule-collection-extensions.md
index 8f2cf40012..4b31cb39d6 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/rule-collection-extensions.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/rule-collection-extensions.md
@@ -6,12 +6,12 @@ ms.collection:
- must-keep
ms.topic: conceptual
ms.localizationpriority: medium
-ms.date: 12/19/2023
+ms.date: 12/23/2023
---
# AppLocker rule collection extensions
-This article describes the rule collection extensions added in Windows 10 or later. Rule collection extensions are optional features available only for the EXE and DLL rule collections. Configure rule collection extensions by directly editing your AppLocker policy XML as shown in the following XML fragment.
+This article describes the rule collection extensions added in Windows 10 and later. Rule collection extensions are optional features available only for the EXE and DLL rule collections. Configure rule collection extensions by directly editing your AppLocker policy XML as shown in the following XML fragment.
```xml
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/script-rules-in-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/script-rules-in-applocker.md
index ea18273ead..0343d4d644 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/script-rules-in-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/script-rules-in-applocker.md
@@ -3,7 +3,7 @@ title: Script rules in AppLocker
description: This article describes the file formats and available default rules for the script rule collection.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 06/15/2022
+ms.date: 12/23/2023
---
# Script rules in AppLocker
@@ -20,10 +20,10 @@ AppLocker defines script rules to include only the following file formats:
The following table lists the default rules that are available for the script rule collection.
| Purpose | Name | User | Rule condition type |
-| - | - | - | - |
+| --- | --- | --- | --- |
| Allows members of the local Administrators group to run all scripts| (Default Rule) All scripts| BUILTIN\Administrators | Path: `*\` |
-| Allow all users to run scripts in the Windows folder| (Default Rule) All scripts located in the Windows folder| Everyone | Path: `%windir%\*` |
-| Allow all users to run scripts in the Program Files folder| (Default Rule) All scripts located in the Program Files folder|Everyone | Path: `%programfiles%\*`|
+| Allow all users to run scripts in the Windows folder | (Default Rule) All scripts located in the Windows folder | Everyone | Path: `%windir%\*` |
+| Allow all users to run scripts in the Program Files folder| (Default Rule) All scripts located in the Program Files folder | Everyone | Path: `%programfiles%\*`|
> [!NOTE]
> When a script runs that is not allowed by policy, AppLocker raises an event indicating that the script was "blocked". However, the actual script enforcement behavior is handled by the script host. In the case of PowerShell, "blocked" scripts will still run, but only in [Constrained Language Mode](/powershell/module/microsoft.powershell.core/about/about_language_modes). Authorized scripts run in Full Language Mode.
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/security-considerations-for-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/security-considerations-for-applocker.md
index 69f190b3f5..0422c26a4d 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/security-considerations-for-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/security-considerations-for-applocker.md
@@ -1,47 +1,39 @@
---
title: Security considerations for AppLocker
-description: This topic for the IT professional describes the security considerations you need to address when implementing AppLocker.
+description: This article for the IT professional describes the security considerations you need to address when implementing AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Security considerations for AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article for the IT professional describes the security considerations you need to address when implementing AppLocker.
-This topic for the IT professional describes the security considerations you need to address when implementing AppLocker.
-
-The purpose of AppLocker is to restrict the access to software, and therefore, the data accessed by the software, to a specific group of users or within a defined business group. The following are security considerations for
-AppLocker:
+AppLocker helps restrict access to software for specific users or groups of users. The following are security considerations for AppLocker:
AppLocker is deployed within an enterprise and administered centrally by those resources in IT with trusted credentials. This system makes its policy creation and deployment conform to similar policy deployment processes and security restrictions.
-AppLocker policies are distributed through known processes and by known means within the domain through Group Policy. But AppLocker policies can also be set on individual computers if the person has administrator privileges, and those policies might be contrary to the organization's written security policy. The enforcement settings for local policies are overridden by the same AppLocker policies in a Group Policy Object (GPO). However, because AppLocker rules are additive, a local policy that isn't in a GPO will still be evaluated for that computer.
+AppLocker policies are distributed through known processes and by known means within the domain through Group Policy. But AppLocker policies can also be set on individual computers if the person has administrator privileges, and those policies might be contrary to the organization's written security policy. The enforcement mode settings from AppLocker policies distributed through Group Policy Objects (GPO) take precedence over local policies. However, because AppLocker rules are additive, a local policy's rules are merged with rules from any GPOs applied to the computer.
Microsoft doesn't provide a way to develop any extensions to AppLocker. The interfaces aren't public. A user with administrator credentials can automate some AppLocker processes by using Windows PowerShell cmdlets. For info about the Windows PowerShell cmdlets for AppLocker, see the [AppLocker Cmdlets in Windows PowerShell](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee460962(v=technet.10)).
-AppLocker runs in the context of Administrator or LocalSystem, which is the highest privilege set. This security context has the potential of misuse. If a user with administrative credentials makes changes to an AppLocker policy on a local device that is joined to a domain, those changes could be overwritten or disallowed by the GPO that contains the AppLocker rule for the same file (or path) that was changed on the local device. However, because AppLocker rules are additive, a local policy that isn't in a GPO will still be evaluated for that computer. If the local computer isn't joined to a domain and isn't administered by Group Policy, a person with administrative credentials can alter the AppLocker policy.
+AppLocker runs in the context of Administrator or LocalSystem, which is the highest privilege set. This security context has the potential of misuse. Because AppLocker rules are additive, any local policy rules are applied to that computer along with any GPOs. If the local computer isn't joined to a domain or controlled by Group Policy, a person with administrative credentials can fully control the AppLocker policy.
-When files are being secured in a directory with a rule of the path condition type, whether using the allow or deny action on the rule, it's still necessary and good practice to restrict access to those files by setting the access control lists (ACLs) according to your security policy.
+AppLocker path rules don't replace access control lists (ACLs). You should continue to use ACLs to restrict access to files according to your security policy.
-AppLocker doesn't protect against running 16-bit DOS binaries in the Virtual DOS Machine (NTVDM). This technology allows running legacy DOS and 16-bit Windows programs on computers that are using Intel 80386 or later when there's already another operating system running and controlling the hardware. The result is that 16-bit binaries can still run on Windows Server 2008 R2 and Windows 7 when AppLocker is configured to otherwise block binaries and libraries. If it's a requirement to prevent 16-bit applications from running, you must configure the Deny rule in the executable rule collection for NTVDM.exe.
-
-You can't use AppLocker (or Software Restriction Policies) to prevent code from running outside the Win32 subsystem. In particular, this rule applies to the (POSIX) subsystem in Windows NT. If it's a requirement to prevent applications from running in the POSIX subsystem, you must disable the subsystem.
+You can't use AppLocker to prevent code from running outside the Win32 subsystem. For example, it can't control code running in the Windows Subsystem for Linux. If it's a requirement to prevent applications from running in the Linux subsystem, you must disable the subsystem. Or, you can block the Windows Subsystem for Linux by blocking LxssManager.dll.
AppLocker can only control VBScript, JScript, .bat files, .cmd files, and Windows PowerShell scripts. It doesn't control all interpreted code that runs within a host process, for example, Perl scripts and macros. Interpreted code is a form of executable code that runs within a host process. For example, Windows batch files (\*.bat) run within the context of the Windows Command Host (cmd.exe). To control interpreted code by using AppLocker, the host process must call AppLocker before it runs the interpreted code, and then enforce the decision returned by AppLocker. Not all host processes call into AppLocker and, therefore, AppLocker can't control every kind of interpreted code, such as Microsoft Office macros.
> [!IMPORTANT]
> You should configure the appropriate security settings of these host processes if you must allow them to run. For example, configure the security settings in Microsoft Office to ensure that only signed and trusted macros are loaded.
-
-AppLocker rules either allow or prevent an application from launching. AppLocker doesn't control the behavior of applications after they're launched. Applications could contain flags passed to functions that signal AppLocker to circumvent the rules and allow another .exe or .dll to be loaded. In practice, an application that is allowed by AppLocker could use these flags to bypass AppLocker rules and launch child processes. You must thoroughly examine each application before allowing them to run by using AppLocker rules.
+
+AppLocker rules either allow or block application file from running. AppLocker doesn't control the behavior of applications after they're launched. Applications could contain flags passed to functions that signal AppLocker to circumvent the rules and allow another .exe or .dll to be loaded. In practice, an allowed application could use these flags to bypass AppLocker rules and launch child processes. You must thoroughly examine each application before allowing them to run by using AppLocker rules.
> [!NOTE]
> Two flags that illustrate this condition are `SANDBOX_INERT`, which can be passed to `CreateRestrictedToken`, and `LOAD_IGNORE_CODE_AUTHZ_LEVEL`, which can be passed to `LoadLibraryEx`. Both of these flags signal AppLocker to circumvent the rules and allow a child .exe or .dll to be loaded.
-You can block the Windows Subsystem for Linux by blocking LxssManager.dll.
-
-## Related topics
+## Related articles
- [AppLocker technical reference](applocker-technical-reference.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md
index a10756f305..bd84599f4e 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md
@@ -1,36 +1,28 @@
---
title: Understanding AppLocker allow and deny actions on rules
-description: This topic explains the differences between allow and deny actions on AppLocker rules.
+description: This article explains the differences between allow and deny actions on AppLocker rules.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Understanding AppLocker allow and deny actions on rules
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic explains the differences between allow and deny actions on AppLocker rules.
+This article explains the differences between allow and deny actions on AppLocker rules.
## Allow action versus deny action on rules
-Unlike Software Restriction Policies (SRP), each AppLocker rule collection functions as an allowed list of files. Only the files that are listed within the rule collection are allowed to run. This **block by default, allow by exception** configuration makes it easier to determine what will occur when an AppLocker rule is applied.
+Each AppLocker rule collection functions as an explicit allowlist of files. You can only run files that are covered by one or more allow rules within the rule collection. You can also create rules that explicitly deny some files from running. All other files not covered by an explicit Allow or Deny rule are *implicitly* blocked from running. Understanding this **block by default, allow by exception** behavior is critical when analyzing how your policy affects users in your organization.
-You can also create rules that use the deny action. When applying rules, AppLocker first checks whether any explicit deny actions are specified in the rule list. If you have denied a file from running in a rule collection, the deny action will take precedence over any allow action, regardless of which Group Policy Object (GPO) the rule was originally applied in. Because AppLocker functions as an allowed list by default, if no rule explicitly allows or denies a file from running, AppLocker's default deny action will block the file.
+When AppLocker applies rules, it first checks whether any explicit deny actions are specified in the rule list. If you deny a file from running in a rule collection, the deny action takes precedence over any allow action and can't be overridden. Then, AppLocker checks for any explicit allow actions for the file. Because AppLocker functions as an allowlist by default, if no rule explicitly allows or denies a file from running, AppLocker's default deny action blocks the file.
-### Deny rule considerations
+### Using AppLocker to implement a blocklist
-Although you can use AppLocker to create a rule to allow all files to run and then use rules to deny specific files, this configuration is not recommended. The deny action is generally less secure than the allow action because a malicious user could modify the file to invalidate the rule. Deny actions can also be circumvented. For example, if you configure a deny action for a file or folder path, the user can still run the file from any other path. The following table details security concerns for different rule conditions with deny actions.
+Although you can use AppLocker to create an explicit blocklist policy, this approach doesn't scale well for most organizations and isn't recommended as a practical application control strategy. However, if you choose to do so, be sure to include an "allow \*" rule within the rule collection so that all other files run.
-| Rule condition | Security concern with deny action |
-| - | - |
-| Publisher | A user could modify the properties of a file (for example, re-signing the file with a different certificate).|
-| File hash | A user could modify the hash for a file.|
-| Path | A user could move the denied file to a different location and run it from there.|
-
->**Important:** If you choose to use the deny action on rules, you must ensure that you first create rules that allow the Windows system files to run. AppLocker enforces rules for allowed applications by default, so after one or more rules have been created for a rule collection (affecting the Windows system files), only the apps that are listed as being allowed will be permitted to run. Therefore, creating a single rule in a rule collection to deny a malicious file from running will also deny all other files on the computer from running.
-
-## Related topics
+> [!IMPORTANT]
+> If you don't include allow rules for all required apps, including Windows system files, within a rule collection, you will cause unexpected results because your policy will *implicitly* deny all other files on the computer from running.
+
+## Related articles
- [How AppLocker works](how-applocker-works-techref.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-default-rules.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-default-rules.md
index 764edf8acd..b70374af0f 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-default-rules.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-default-rules.md
@@ -1,43 +1,39 @@
---
title: Understanding AppLocker default rules
-description: This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied.
+description: This article for IT professional describes the set of rules that can be used to ensure that required Windows system files continue to run when the policy is applied.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Understanding AppLocker default rules
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article for IT professional describes the set of rules that can be used to ensure that required Windows system files continue to run when the policy is applied.
-This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied.
-
-AppLocker includes default rules for each rule collection. These rules are intended to help ensure that the files that are required for Windows to operate properly are allowed in an AppLocker rule collection.
+The AppLocker wizard includes default rules for each rule collection. These rules are intended to help ensure that the files that are required for Windows to operate properly are allowed in an AppLocker rule collection.
> [!IMPORTANT]
> You can use the default rules as a template when creating your own rules. However, these rules are only meant to function as a starter policy when you are first testing AppLocker rules so that the system files in the Windows folders will be allowed to run.
-
-If you require additional app security, you might need to modify the rules created from the built-in default rule collection. For example, the default rule to allow all users to run .exe files in the Windows folder is based on a path condition that allows all files within the Windows folder to run.
-The Windows folder contains a Temp subfolder to which the Users group is given the following permissions:
-- Traverse Folder/Execute File
-- Create Files/Write Data
-- Create Folders/Append Data
+If you require extra app security, you might need to modify the rules created from the built-in default rule collection. For example, the default rule to allow all users to run .exe files in the Windows folder is based on a path condition that allows all files within the Windows folder to run. The Windows folder contains a Temp subfolder to which the Users group is given the following permissions:
+
+- Traverse Folder/Execute File
+- Create Files/Write Data
+- Create Folders/Append Data
These permissions settings are applied to this folder for app compatibility. However, because any user can create files in this location, allowing applications to be run from this location might conflict with your organization's security policy.
## In this section
-| Topic | Description |
-| - | - |
-| [Executable rules in AppLocker](executable-rules-in-applocker.md) | This topic describes the file formats and available default rules for the executable rule collection. |
-| [Windows Installer rules in AppLocker](windows-installer-rules-in-applocker.md) | This topic describes the file formats and available default rules for the Windows Installer rule collection.|
-| [Script rules in AppLocker](script-rules-in-applocker.md) | This topic describes the file formats and available default rules for the script rule collection.|
-| [DLL rules in AppLocker](dll-rules-in-applocker.md) | This topic describes the file formats and available default rules for the DLL rule collection.|
-| [Packaged apps and packaged app installer rules in AppLocker](packaged-apps-and-packaged-app-installer-rules-in-applocker.md) | This topic explains the AppLocker rule collection for packaged app installers and packaged apps.|
-
-## Related topics
+| Article | Description |
+| --- | --- |
+| [Executable rules in AppLocker](executable-rules-in-applocker.md) | This article describes the file formats and available default rules for the executable rule collection. |
+| [Windows Installer rules in AppLocker](windows-installer-rules-in-applocker.md) | This article describes the file formats and available default rules for the Windows Installer rule collection.|
+| [Script rules in AppLocker](script-rules-in-applocker.md) | This article describes the file formats and available default rules for the script rule collection.|
+| [DLL rules in AppLocker](dll-rules-in-applocker.md) | This article describes the file formats and available default rules for the DLL rule collection.|
+| [Packaged apps and packaged app installer rules in AppLocker](packaged-apps-and-packaged-app-installer-rules-in-applocker.md) | This article explains the AppLocker rule collection for packaged app installers and packaged apps.|
+
+## Related articles
- [How AppLocker works](how-applocker-works-techref.md)
- [Create AppLocker default rules](create-applocker-default-rules.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md
index 7a6eea342e..e97d2e0962 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md
@@ -1,27 +1,25 @@
---
title: Understanding AppLocker rule behavior
-description: This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker.
+description: This article describes how AppLocker rules are enforced by using the allow and deny options in AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Understanding AppLocker rule behavior
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article describes how AppLocker rules are enforced by using the allow and deny options in AppLocker.
-This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker.
-
-If no AppLocker rules for a specific rule collection exist, all files with that file format are allowed to run. However, when an AppLocker rule for a specific rule collection is created, only the files explicitly allowed in a rule are permitted to run. For example, if you create an executable rule that allows .exe files in *%SystemDrive%\\FilePath* to run, only executable files located in that path are allowed to run.
+If no AppLocker rules exist for a specific rule collection, all files covered by that rule collection are allowed to run. However, once an AppLocker rule for a specific rule collection is created, only the files explicitly allowed by at least one rule are permitted to run. For example, if you create an executable rule that allows .exe files in *%SystemDrive%\\FilePath* to run, only executable files located in that path are allowed to run. Executable files run from any other path are blocked.
A rule can be configured to use either an allow or deny action:
-- **Allow**. You can specify which files are allowed to run in your environment and for which users or groups of users. You can also configure exceptions to identify files that are excluded from the rule.
-- **Deny**. You can specify which files aren't allowed to run in your environment and for which users or groups of users. You can also configure exceptions to identify files that are excluded from the rule.
+- **Allow**. You can specify which files are allowed to run in your environment and for which users or groups of users. You can also configure exceptions to identify files that are excluded from the rule.
+- **Deny**. You can specify which files aren't allowed to run in your environment and for which users or groups of users. You can also configure exceptions to identify files that are excluded from the rule.
->**Important:** You can use a combination of allow actions and deny actions. However, we recommend using allow actions with exceptions because deny actions override allow actions in all cases. Deny actions can also be circumvented. For example, if you configure a deny action for a file or folder path, the user can still run the file from any other path.
-
-## Related topics
+> [!IMPORTANT]
+> You can use a combination of allow actions and deny actions. However, we recommend using allow actions with exceptions because deny actions override allow actions in all cases.
+
+## Related articles
- [How AppLocker works](how-applocker-works-techref.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md
index 3f9f5ad500..bd418d4ce7 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md
@@ -1,33 +1,33 @@
---
title: Understanding AppLocker rule collections
-description: This topic explains the five different types of AppLocker rules used to enforce AppLocker policies.
+description: This article explains the five different types of AppLocker rule collections used to enforce AppLocker policies.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Understanding AppLocker rule collections
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic explains the five different types of AppLocker rules used to enforce AppLocker policies.
+This article explains the five different types of AppLocker rule collections used to enforce AppLocker policies.
An AppLocker rule collection is a set of rules that apply to one of five types:
-- Executable files: .exe and .com
-- Windows Installer files: .msi, mst, and .msp
-- Scripts: .ps1, .bat, .cmd, .vbs, and .js
-- DLLs: .dll and .ocx
-- Packaged apps and packaged app installers: .appx
+- Executable files: .exe and .com
+- Windows Installer files: .msi, mst, and .msp
+- Scripts: .ps1, .bat, .cmd, .vbs, and .js
+- DLLs: .dll and .ocx
+- Packaged apps and packaged app installers: .appx
-If you use DLL rules, a DLL allow rule has to be created for each DLL that is used by all of the allowed apps.
+> [!IMPORTANT]
+> Each app can load several DLLs, and AppLocker must check each DLL before it is allowed to run. Be sure you create DLL allow rules for every DLL that is used by any of the allowed apps. Denying some DLLs from running can also create app compatibility problems.
+>
+> DLL rules might cause performance problems on some computers which are already resource constrained.
+>
+> As a result, the DLL rule collection is not enabled by default.
->**Important:** Each app can load several DLLs, and AppLocker must check each DLL before it is allowed to run. Therefore, creating DLL rules might cause performance problems on some computers. Denying some DLLs from running can also create app compatibility problems. As a result, the DLL rule collection is not enabled by default.
-
For info about how to enable the DLL rule collection, see [Enable the DLL rule collection](enable-the-dll-rule-collection.md).
-## Related topics
+## Related articles
- [How AppLocker works](how-applocker-works-techref.md)
- [Understanding AppLocker default rules](understanding-applocker-default-rules.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md
index bad3241ee2..2c4967a466 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md
@@ -1,55 +1,46 @@
---
title: Understanding AppLocker rule condition types
-description: This topic for the IT professional describes the three types of AppLocker rule conditions.
+description: This article for the IT professional describes the three types of AppLocker rule conditions.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Understanding AppLocker rule condition types
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic for the IT professional describes the three types of AppLocker rule conditions.
+This article for the IT professional describes the three types of AppLocker rule conditions.
Rule conditions are criteria that the AppLocker rule is based on. Primary conditions are required to create an AppLocker rule. The three primary rule conditions are publisher, path, and file hash.
-**Publisher**
+## Publisher
-To use a publisher condition, the files must be digitally signed by the software publisher, or you must do so by using an internal certificate. Rules that are specified to the version level might have to be updated when a new version of the file is released. For more info about this rule condition, see [Understanding the publisher rule condition in AppLocker](understanding-the-publisher-rule-condition-in-applocker.md).
+To use a publisher condition, the software publisher must digitally sign their app files, or you must do so by using an internal certificate. Rules that are specified to the version level might have to be updated when a new version of the file is released. For more info about this rule condition, see [Understanding the publisher rule condition in AppLocker](understanding-the-publisher-rule-condition-in-applocker.md).
-**Path**
+## Path
-Any file can be assigned this rule condition; however, because path rules specify locations within the file system, any subdirectory will also be affected by the rule (unless explicitly exempted). For more info about this rule condition, see [Understanding the path rule condition in AppLocker](understanding-the-path-rule-condition-in-applocker.md).
+Any file can be assigned this rule condition. However, because path rules specify locations within the file system, the rule also affects any subdirectories unless explicitly exempted. For more info about this rule condition, see [Understanding the path rule condition in AppLocker](understanding-the-path-rule-condition-in-applocker.md).
-**File hash**
+## File hash
-Any file can be assigned this rule condition; however, the rule must be updated each time a new version of the file is released because the hash value is unique to that the version of the file. For more info about this rule condition, see [Understanding the file hash rule condition in AppLocker](understanding-the-file-hash-rule-condition-in-applocker.md).
+Any file can be assigned this rule condition. However, the rule must be updated each time a new version of the file is released because the Authenticode hash value is unique for each version of the file. For more info about this rule condition, see [Understanding the file hash rule condition in AppLocker](understanding-the-file-hash-rule-condition-in-applocker.md).
-### Considerations
+## Considerations
Selecting the appropriate condition for each rule depends on the overall application control policy goals of the organization, the AppLocker rule maintenance goals, and the condition of the existing (or planned) application deployment. The following questions can help you decide which rule condition to use.
-1. Is the file digitally signed by a software publisher?
+1. Is the file digitally signed by a software publisher?
- If the file is signed by a software publisher, we recommend that you create rules with publisher conditions. You may still create file hash and path conditions for signed files. However, if the file is not digitally signed by a software publisher, you can:
+ If the software publisher signed the file, we recommend that you create rules with publisher conditions. You can still create file hash and path conditions for signed files. However, if the software publisher didn't sign the file, you can:
+
+ - Sign the file by using an internal certificate.
+ - Create a rule by using a file hash condition.
+ - Create a rule by using a path condition.
- - Sign the file by using an internal certificate.
- - Create a rule by using a file hash condition.
- - Create a rule by using a path condition.
-
> [!NOTE]
- > To determine how many applications on a reference computer are digitally signed, you can use the **Get-AppLockerFileInformation** Windows PowerShell cmdlet for a directory of files. For example,
- `Get-AppLockerFileInformation -Directory C:\Windows\ -FileType EXE -recurse` displays the properties for all .exe and .com files within the Windows directory.
-
-2. What rule condition type does your organization prefer?
-
- If your organization is already using Software Restriction Policies (SRP) to restrict what files users can run, rules using file hash or path conditions are probably already in place.
-
- > [!NOTE]
- > For a list of supported operating system versions and editions to which SRP and AppLocker rules can be applied, see [Requirements to use AppLocker](requirements-to-use-applocker.md).
-
-## Related topics
+ > To determine how many applications on a reference computer are digitally signed, you can use the **Get-AppLockerFileInformation** Windows PowerShell cmdlet for a directory of files. For example, `Get-AppLockerFileInformation -Directory C:\Windows\ -FileType EXE -recurse` displays the properties for all .exe and .com files within the Windows directory.
+
+2. What rule condition type does your organization prefer?
+
+## Related articles
- [How AppLocker works](how-applocker-works-techref.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md
index 416310d176..2df99102d0 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md
@@ -1,24 +1,23 @@
---
title: Understanding AppLocker rule exceptions
-description: This topic describes the result of applying AppLocker rule exceptions to rule collections.
+description: This article describes the result of applying AppLocker rule exceptions to rule collections.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Understanding AppLocker rule exceptions
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+
-This topic describes the result of applying AppLocker rule exceptions to rule collections.
+This article describes the result of applying AppLocker rule exceptions to rule collections.
-You can apply AppLocker rules to individual users or a group of users. If you apply a rule to a group of users, all users in that group are affected by that rule. If you need to allow a subset of a user group to use an app, you can create a special rule for that subset.
+You can apply AppLocker rules to individual users or a group of users. If you apply a rule to a group of users, the rule affects all users in that group. If you need to allow a subset of a user group to use an app, you can create a special rule for that subset.
For example, the rule "Allow Everyone to run Windows except Registry Editor" allows Everyone to run Windows binaries, but doesn't allow anyone to run Registry Editor (by adding %WINDIR%\regedit.exe as a Path Exception for the rule).
The effect of this rule would prevent users such as Helpdesk personnel from running the Registry Editor, a program that is necessary for their support tasks.
-To resolve this problem, create a second rule that applies to the Helpdesk user group: "Allow Helpdesk to run Registry Editor" and add %WINDIR%\regedit.exe as an allowed path. If you create a deny rule that doesn't allow any users to run Registry Editor, the deny rule will override the second rule that allows the Helpdesk user group to run Registry Editor.
+To resolve this problem, create a second rule that applies to the Helpdesk user group: "Allow Helpdesk to run Registry Editor" and add %WINDIR%\regedit.exe as an allowed path. If you create a deny rule that blocks Registry Editor for all users, the deny rule overrides the second rule that allows the Helpdesk user group to run Registry Editor.
-## Related topics
+## Related articles
- [How AppLocker works](how-applocker-works-techref.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md
index 9c95ff5c19..9937009a5e 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md
@@ -1,26 +1,23 @@
---
title: Understanding the file hash rule condition in AppLocker
-description: This topic explains the AppLocker file hash rule condition, the advantages and disadvantages, and how it's applied.
+description: This article explains how to use the AppLocker file hash rule condition and its advantages and disadvantages.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Understanding the file hash rule condition in AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article explains how to use the AppLocker file hash rule condition and its advantages and disadvantages.
-This topic explains the AppLocker file hash rule condition, the advantages and disadvantages, and how it's applied.
-
-File hash rules use a system-computed cryptographic hash of the identified file. For files that aren't digitally signed, file hash rules are more secure than path rules. The following table describes the advantages and disadvantages of the file hash condition.
+File hash rules use a system-computed Authenticode cryptographic hash of the identified file. For files that aren't digitally signed, file hash rules are more secure than path rules. The following table describes the advantages and disadvantages of the file hash condition.
| File hash condition advantages | File hash condition disadvantages |
-| - | - |
-| Because each file has a unique hash, a file hash condition applies to only one file. | Each time that the file is updated (such as a security update or upgrade), the file's hash will change. As a result, you must manually update file hash rules.|
-
-For an overview of the three types of AppLocker rule conditions and explanations of the advantages and disadvantages of each, see [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md).
+| --- | --- |
+| Because each file has a unique hash, a file hash condition applies to only one file. | Each time that the file is updated (such as a security update or upgrade), the file's Authenticode hash changes. As a result, you must manually update file hash rules. |
-## Related topics
+For an overview of the three types of AppLocker rule conditions and their advantages and disadvantages of each, see [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md).
+
+## Related articles
- [How AppLocker works](how-applocker-works-techref.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md
index 4a28e77011..2d1d4b9cae 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md
@@ -1,29 +1,26 @@
---
title: Understanding the path rule condition in AppLocker
-description: This topic explains the AppLocker path rule condition, the advantages and disadvantages, and how it's applied.
+description: This article explains how to apply the AppLocker path rule condition and its advantages and disadvantages.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Understanding the path rule condition in AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic explains the AppLocker path rule condition, the advantages and disadvantages, and how it's applied.
+This article explains how to apply the AppLocker path rule condition and its advantages and disadvantages.
The path condition identifies an application by its location in the file system of the computer or on the network.
-When creating a rule that uses a deny action, path conditions are less secure than publisher and file hash conditions for preventing access to a file because a user could easily copy the file to a different location than the location specified in the rule. Because path rules specify locations within the file system, you should ensure that there are no subdirectories that are writable by non-administrators. For example, if you create a path rule for C:\\ with the allow action, any file under that location will be allowed to run, including within users' profiles. The following table describes the advantages and disadvantages of the path condition.
+Path rules that use the deny action, are less effective than other types of rules, because a user (or malware acting as a user) can easily copy the file to a different location to run it. Because path rules specify locations within the file system, you should ensure that there are no subdirectories that are writable by nonadministrators. For example, if you create a path rule using the allow action for C:\\, any file under that location can run, including file within users' profiles. The following table describes the advantages and disadvantages of the path condition.
|Path condition advantages|Path condition disadvantages|
-|--- |--- |
-|You can easily control many folders or a single file.You can use the asterisk (*) as a wildcard character within path rules.|It might be less secure if a rule that is configured to use a folder path contains subfolders that are writable by non-administrators.You must specify the full path to a file or folder when creating path rules so that the rule will be properly enforced.|
+| --- | --- |
+| You can easily control many folders or a single file. You can use the asterisk (*) as a wildcard character within path rules. | It might be less secure if a rule that is configured to use a folder path contains subfolders that are writable by nonadministrators. You must specify the full path to a file or folder when creating path rules so that the rule is properly enforced. |
-AppLocker doesn't enforce rules that specify paths with short names. You should always specify the full path to a file or folder when creating path rules so that the rule will be properly enforced.
+AppLocker doesn't enforce rules that specify paths with short names. You should always specify the full path to a file or folder when creating path rules so that the rule is properly enforced.
-The asterisk (\*) wildcard character can be used within **Path** field. The asterisk (\*) character used by itself represents any path. When combined with any string value, the rule is limited to the path of the file and all the files under that path. For example, %ProgramFiles%\\Internet Explorer\\\* indicates that all files and subfolders within the Internet Explorer folder will be affected by the rule.
+The asterisk (\*) wildcard character can be used within **Path** field. The asterisk (\*) character used by itself represents any path. When combined with any string value, the rule is limited to the path of the file and all the files under that path. For example, %ProgramFiles%\\Internet Explorer\\\* indicates that the rule affects all files and subfolders within the Internet Explorer folder.
AppLocker uses path variables for well-known directories in Windows. Path variables aren't environment variables. The AppLocker engine can only interpret AppLocker path variables. The following table details these path variables.
@@ -36,8 +33,8 @@ AppLocker uses path variables for well-known directories in Windows. Path variab
| Removable media (for example, CD or DVD) | %REMOVABLE% | |
| Removable storage device (for example, USB flash drive) | %HOT% | |
-For an overview of the three types of AppLocker rule conditions and explanations of the advantages and disadvantages of each, see [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md).
+For an overview of the three types of AppLocker rule conditions and their advantages and disadvantages of each, see [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md).
-## Related topics
+## Related articles
- [How AppLocker works](how-applocker-works-techref.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md
index a915c31c36..171ef6e3f1 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md
@@ -1,63 +1,58 @@
---
title: Understanding the publisher rule condition in AppLocker
-description: This topic explains the AppLocker publisher rule condition, what controls are available, and how it's applied.
+description: This article explains how to apply the AppLocker publisher rule condition and what controls are available.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Understanding the publisher rule condition in AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
+This article explains how to apply the AppLocker publisher rule condition and what controls are available.
-This topic explains the AppLocker publisher rule condition, what controls are available, and how it's applied.
-
-Publisher conditions can be made only for files that are digitally signed; this condition identifies an app based on its digital signature and extended attributes. The digital signature contains information about the company that created the app (the publisher). The extended attributes, which are obtained from the binary resource, contain the name of the product that the app is part of and the version number of the app. The publisher may be a software development company, such as Microsoft, or the Information Technology department of your organization.
-Publisher conditions are easier to maintain than file hash conditions and are more secure than path conditions. Rules that are specified to the version level might have to be updated when a new version of the file is released. The following table describes the advantages and disadvantages
-of the publisher condition.
+Publisher conditions can be made only for files that are digitally signed. This condition identifies an app's file based on its digital signature and extended attributes. The digital signature contains information about the company that created the app (the publisher). The extended attributes, which are obtained from the binary resource, contain the name of the product that the app is part of and the version number of the app. The publisher can be a software development company, such as Microsoft, or the Information Technology department of your organization. Publisher conditions are easier to maintain than file hash conditions and are more secure than path conditions. Rules that are specified to the version level might have to be updated when a new version of the file is released. The following table describes the advantages and disadvantages of the publisher condition.
|Publisher condition advantages|Publisher condition disadvantages|
-|--- |--- |
-|Frequent updating isn't required.You can apply different values within a certificate.A single rule can be used to allow an entire product suite.You can use the asterisk (*) wildcard character within a publisher rule to specify that any value should be matched.|The file must be signed.Although a single rule can be used to allow an entire product suite, all files in the suite must be signed uniformly.|
-
+| --- | --- |
+| Frequent updating isn't required. You can apply different values within a certificate. A single rule can be used to allow an entire product suite. You can use the asterisk (*) wildcard character within a publisher rule to specify that any value should be matched.| The file must be signed. Although a single rule can be used to allow an entire product suite, all files in the suite must be signed uniformly.|
+
Wildcard characters can be used as values in the publisher rule fields according to the following specifications:
-- **Publisher**
+- **Publisher**
- The asterisk (\*) character used by itself represents any publisher. When combined with any string value, the rule is limited to the publisher with a value in the signed certificate that matches the character string. In other words, the asterisk isn't treated as a wildcard character if used with other characters in this field. For example, using the characters "M\*" limits the publisher name to only a publisher with the name "M\*." Using the characters "\*x\*" limits the publisher name only to the name "\*x\*". A question mark (?) isn't a valid wildcard character in this field.
+ The asterisk (\*) character used by itself represents any publisher. When combined with any string value, the rule is limited to the publisher with a value in the signed certificate that matches the character string. In other words, the asterisk isn't treated as a wildcard character if used with other characters in this field. For example, using the characters "M\*" limits the publisher name to only a publisher with the name "M\*." Using the characters "\*x\*" limits the publisher name only to the name "\*x\*." A question mark (?) isn't a valid wildcard character in this field.
-- **Product name**
+- **Product name**
The asterisk (\*) character used by itself represents any product name. When combined with any string value, the rule is limited to the product of the publisher with a value in the signed certificate that matches the character string. In other words, the asterisk isn't treated as a wildcard character if used with other characters in this field. A question mark (?) isn't a valid wildcard character in this field.
-- **File name**
+- **File name**
- Either the asterisk (\*) or question mark (?) characters used by themselves represent any and all file names. When combined with any string value, the string is matched with any file name containing that string.
+ Either the asterisk (\*) or question mark (?) characters used by themselves represent any file names. When combined with any string value, the string is matched with any file name containing that string.
-- **File version**
+- **File version**
The asterisk (\*) character used by itself represents any file version. If you want to limit the file version to a specific version or as a starting point, you can state the file version and then use the following options to apply limits:
- - **Exactly**. The rule applies only to this version of the app
- - **And above**. The rule applies to this version and all later versions.
- - **And Below**. The rule applies to this version and all earlier versions.
+ - **Exactly**. The rule applies only to this version of the app
+ - **And above**. The rule applies to this version and all later versions.
+ - **And Below**. The rule applies to this version and all earlier versions.
The following table describes how a publisher condition is applied.
| Option | The publisher condition allows or denies...|
-| - | - |
-| **All signed files** | All files that are signed by a publisher.|
-| **Publisher only** | All files that are signed by the named publisher.|
-| **Publisher and product name** | All files for the specified product that are signed by the named publisher.|
-| **Publisher, product name, and file name** | Any version of the named file for the named product that is signed by the publisher.|
-| **Publisher, product name, file name, and file version** | **Exactly**
The specified version of the named file for the named product that is signed by the publisher.|
-| **Publisher, product name, file name, and file version** | **And above**
The specified version of the named file and any new releases for the product that are signed by the publisher.|
-| **Publisher, product name, file name, and file version**| **And below**
The specified version of the named file and any older versions for the product that are signed by the publisher.|
-| **Custom** | You can edit the **Publisher**, **Product name**, **File name**, and **Version** fields to create a custom rule.|
-
-For an overview of the three types of AppLocker rule conditions and explanations of the advantages and disadvantages of each, see [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md).
+| --- | --- |
+| **All signed files** | All files signed by a publisher. |
+| **Publisher only** | All files signed by the named publisher. |
+| **Publisher and product name** | All files for the specified product signed by the named publisher. |
+| **Publisher, product name, and file name** | Any version of the named file for the named product and signed by the publisher. |
+| **Publisher, product name, file name, and file version** | **Exactly**
The specified version of the named file for the named product signed by the publisher. |
+| **Publisher, product name, file name, and file version** | **And above**
The specified version of the named file and any later versions of the file for the named product signed by the publisher. |
+| **Publisher, product name, file name, and file version**| **And below**
The specified version of the named file and any older versions for the named product signed by the publisher. |
+| **Custom** | You can edit the **Publisher**, **Product name**, **File name**, and **Version** fields to create a custom rule. |
-## Related topics
+For an overview of the three types of AppLocker rule conditions and their advantages and disadvantages, see [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md).
+
+## Related articles
- [How AppLocker works](how-applocker-works-techref.md)
From 6709193f62413df9c14cf0c4cadf373834a28fb5 Mon Sep 17 00:00:00 2001
From: jsuther1974
Date: Sun, 24 Dec 2023 00:07:00 -0800
Subject: [PATCH 6/7] Reviewed AppLocker articles for accuracy and addressed
Acrolinx and readability issues.
---
...blishing.redirection.windows-security.json | 5 ++
.../TOC.yml | 2 -
.../applocker/applocker-settings.md | 30 --------
.../applocker/tools-to-use-with-applocker.md | 31 ++++----
.../using-event-viewer-with-applocker.md | 74 +++++++++----------
5 files changed, 55 insertions(+), 87 deletions(-)
delete mode 100644 windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-settings.md
diff --git a/.openpublishing.redirection.windows-security.json b/.openpublishing.redirection.windows-security.json
index d666189bcf..6b215db613 100644
--- a/.openpublishing.redirection.windows-security.json
+++ b/.openpublishing.redirection.windows-security.json
@@ -4560,6 +4560,11 @@
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-settings",
"redirect_document_id": false
},
+ {
+ "source_path": "windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-settings.md",
+ "redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-overview",
+ "redirect_document_id": false
+ },
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference",
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/TOC.yml b/windows/security/application-security/application-control/windows-defender-application-control/TOC.yml
index 10c18ae319..c2302c6e47 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/TOC.yml
+++ b/windows/security/application-security/application-control/windows-defender-application-control/TOC.yml
@@ -309,5 +309,3 @@
items:
- name: Using Event Viewer with AppLocker
href: applocker\using-event-viewer-with-applocker.md
- - name: AppLocker Settings
- href: applocker\applocker-settings.md
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-settings.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-settings.md
deleted file mode 100644
index 956c1904a8..0000000000
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-settings.md
+++ /dev/null
@@ -1,30 +0,0 @@
----
-title: AppLocker settings
-description: This topic for the IT professional lists the settings used by AppLocker.
-ms.localizationpriority: medium
-ms.topic: conceptual
-ms.date: 09/21/2017
----
-
-# AppLocker settings
-
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic for the IT professional lists the settings used by AppLocker.
-
-The following table describes the settings and values used by AppLocker.
-
-| Setting | Value |
-| - | - |
-| Registry path | Policies are stored in **HKEY_LOCAL_Machine\Software\Policies\Microsoft\Windows\SrpV2** |
-| Firewall ports | Not applicable |
-| Security policies | Custom created, no default |
-| Group Policy settings | Custom created, no default |
-| Network ports | Not applicable |
-| Service accounts | Not applicable |
-| Performance counters | Not applicable |
-
-## Related topics
-
-- [AppLocker technical reference](applocker-technical-reference.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/tools-to-use-with-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/tools-to-use-with-applocker.md
index a683153f73..38354ddb98 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/tools-to-use-with-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/tools-to-use-with-applocker.md
@@ -1,50 +1,47 @@
---
title: Tools to use with AppLocker
-description: This topic for the IT professional describes the tools available to create and administer AppLocker policies.
+description: This article for the IT professional describes the tools available to create and administer AppLocker policies.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/23/2023
---
# Tools to use with AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic for the IT professional describes the tools available to create and administer AppLocker policies.
+This article for the IT professional describes the tools available to create and administer AppLocker policies.
The following tools can help you administer the application control policies created by using AppLocker on the local device or by using Group Policy. For info about the basic requirements for using AppLocker, see [Requirements to use AppLocker](requirements-to-use-applocker.md).
-- **AppLocker Local Security Policy MMC snap-in**
+- **AppLocker Local Security Policy MMC snap-in**
The AppLocker rules can be maintained by using the Local Security Policy snap-in (secpol.msc) of the Microsoft Management Console (MMC). For procedures to create, modify, and delete AppLocker rules, see [Working with AppLocker rules](working-with-applocker-rules.md).
-- **Generate Default Rules tool**
+- **Generate Default Rules tool**
AppLocker includes default rules for each rule collection accessed through the Local Security Policy snap-in. These rules are intended to help ensure that the files that are required for Windows to operate properly are allowed in an AppLocker rule collection. For info about how to use this tool, see [Create AppLocker default rules](create-applocker-default-rules.md). For a list of the default rules, see [AppLocker default rules](working-with-applocker-rules.md#applocker-default-rules).
-- **Automatically Generate AppLocker Rules wizard**
+- **Automatically Generate AppLocker Rules wizard**
- By using the Local Security Policy snap-in, you can automatically generate rules for all files within a folder. The wizard will scan the specified folder and create the condition types that you choose for each file in that folder. For info about how to use this wizard, see [Run the Automatically Generate Rules wizard](run-the-automatically-generate-rules-wizard.md).
+ By using the Local Security Policy snap-in, you can automatically generate rules for all files within a folder. The wizard scans the specified folder and creates the condition types that you choose for each file in that folder. For info about how to use this wizard, see [Run the Automatically Generate Rules wizard](run-the-automatically-generate-rules-wizard.md).
-- **Group Policy**
+- **Group Policy**
You can edit an AppLocker policy by adding, changing, or removing rules by using the Group Policy Management Console (GPMC).
If you want more features to manage AppLocker policies, such as version control, use Group Policy management software that allows you to create versions of Group Policy Objects (GPOs). An example of this type of software is the Advanced Group Policy Management feature from the Microsoft Desktop Optimization Pack.
-- **Remote Server Administration Tools (RSAT)**
+- **Remote Server Administration Tools (RSAT)**
You can use a device with a supported operating system that has the Remote Server Administration Tools (RSAT) installed to create and maintain AppLocker policies.
-- **Event Viewer**
+- **Event Viewer**
- The AppLocker log contains information about applications that are affected by AppLocker rules. For info about using Event Viewer to review the AppLocker logs, see [Using Event Viewer with AppLocker](using-event-viewer-with-applocker.md), and [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md).
+ The AppLocker log contains information about applications affected by AppLocker rules. For info about using Event Viewer to review the AppLocker logs, see [Using Event Viewer with AppLocker](using-event-viewer-with-applocker.md), and [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md).
-- **AppLocker PowerShell cmdlets**
+- **AppLocker PowerShell cmdlets**
- The AppLocker Windows PowerShell cmdlets are designed to streamline the administration of AppLocker policy. They can be used to help create, test, maintain, and troubleshoot an AppLocker policy. The cmdlets are intended to be used in conjunction with the AppLocker user interface that is accessed through the Local Security Policy snap-in and the GPMC. For information about the cmdlets, see the [AppLocker PowerShell Command Reference](/powershell/module/applocker/).
+ The AppLocker Windows PowerShell cmdlets are designed to streamline the administration of AppLocker policy. They can be used to help create, test, maintain, and troubleshoot an AppLocker policy. The cmdlets are intended to be used with the AppLocker user interface that is accessed through the Local Security Policy snap-in and the GPMC. For information about the cmdlets, see the [AppLocker PowerShell Command Reference](/powershell/module/applocker/).
-## Related topics
+## Related articles
- [AppLocker technical reference](applocker-technical-reference.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md
index f237a5b23c..19b2256345 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md
@@ -3,17 +3,16 @@ title: Using Event Viewer with AppLocker
description: This article lists AppLocker events and describes how to use Event Viewer with AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 02/02/2023
+ms.date: 12/23/2023
---
+
+
# Using Event Viewer with AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
This article lists AppLocker events and describes how to use Event Viewer with AppLocker.
-The AppLocker log contains information about applications that are affected by AppLocker rules. Each event in the log contains details such as the following information:
+The AppLocker log contains information about applications affected by AppLocker rules. Each event in the log contains details such as the following information:
- Which file is affected and the path of that file
- Which packaged app is affected and the package identifier of the app
@@ -22,53 +21,52 @@ The AppLocker log contains information about applications that are affected by A
- The rule name
- The security identifier (SID) for the user or group identified in the rule
-Review the entries in the Event Viewer to determine if any applications aren't included in the rules that you automatically generated. For instance, some line-of-business apps are installed to non-standard locations, such as the root of the active drive (for example, `%SystemDrive%`).
+Review the entries in the Event Viewer to determine if any applications aren't included in the rules that you automatically generated. For instance, some line-of-business apps are installed to nonstandard locations, such as the root of the active drive (for example, `%SystemDrive%`).
For info about what to look for in the AppLocker event logs, see [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md).
> [!NOTE]
> The AppLocker event logs are very verbose and can result in a large number of events depending on the policies deployed, particularly in the *AppLocker - EXE and DLL* event log. If you're using an event forwarding and collection service, like LogAnalytics, you may want to adjust the configuration for that event log to only collect Error events or stop collecting events from that log altogether.
-**To review the AppLocker log in Event Viewer**
+## Review the AppLocker logs in Windows Event Viewer
1. Open Event Viewer.
2. In the console tree under **Application and Services Logs\\Microsoft\\Windows**, select **AppLocker**.
-The following table contains information about the events that you can use to determine which apps are affected by AppLocker rules.
+The following table contains information about the events that you can use to determine the apps affected by AppLocker rules.
| Event ID | Level | Event message | Description |
| --- | --- | --- | --- |
-| 8000 | Error| AppID policy conversion failed. Status * <%1> *| Indicates that the policy wasn't applied correctly to the computer. The status message is provided for troubleshooting purposes.|
-| 8001 | Information| The AppLocker policy was applied successfully to this computer.| Indicates that the AppLocker policy was successfully applied to the computer.|
-| 8002 | Information| *<File name> * was allowed to run.| Specifies that the .exe or .dll file is allowed by an AppLocker rule.|
-| 8003 | Warning| *<File name> * was allowed to run but would have been prevented from running if the AppLocker policy were enforced.| Applied only when the **Audit only** enforcement mode is enabled. Specifies that the .exe or .dll file would be blocked if the **Enforce rules** enforcement mode were enabled. |
-| 8004 | Error| *<File name> * was prevented from running.| Access to *<file name>* is restricted by the administrator. Applied only when the **Enforce rules** enforcement mode is set either directly or indirectly through Group Policy inheritance. The .exe or .dll file can't run.|
-| 8005| Information| *<File name> * was allowed to run.| Specifies that the script or .msi file is allowed by an AppLocker rule.|
-| 8006 | Warning| *<File name> * was allowed to run but would have been prevented from running if the AppLocker policy were enforced.| Applied only when the **Audit only** enforcement mode is enabled. Specifies that the script or .msi file would be blocked if the **Enforce rules** enforcement mode were enabled. |
-| 8007 | Error| *<File name> * was prevented from running.| Access to *<file name>* is restricted by the administrator. Applied only when the **Enforce rules** enforcement mode is set either directly or indirectly through Group Policy inheritance. The script or .msi file can't run.|
-| 8008| Warning| *<File name> *: AppLocker component not available on this SKU.| Added in Windows Server 2012 and Windows 8.|
-| 8020| Information| *<File name> * was allowed to run.| Added in Windows Server 2012 and Windows 8.|
-| 8021| Warning| *<File name> * was allowed to run but would have been prevented from running if the AppLocker policy were enforced.| Added in Windows Server 2012 and Windows 8.|
-| 8022| Error| *<File name> * was prevented from running.| Added in Windows Server 2012 and Windows 8.|
-| 8023 | Information| *<File name> * was allowed to be installed.| Added in Windows Server 2012 and Windows 8.|
-| 8024 | Warning| *<File name> * was allowed to run but would have been prevented from running if the AppLocker policy were enforced.| Added in Windows Server 2012 and Windows 8.|
-| 8025 | Error| *<File name> * was prevented from running.| Added in Windows Server 2012 and Windows 8.|
-| 8027 | Error| No packaged apps can be executed while Exe rules are being enforced and no Packaged app rules have been configured.| Added in Windows Server 2012 and Windows 8.|
-| 8028 | Warning | *<File name> * was allowed to run but would have been prevented if the Config CI policy were enforced.| Added in Windows Server 2016 and Windows 10.|
-| 8029 | Error | *<File name> * was prevented from running due to Config CI policy.| Added in Windows Server 2016 and Windows 10.|
-| 8030 | Information | ManagedInstaller check SUCCEEDED during Appid verification of * | Added in Windows Server 2016 and Windows 10.|
-| 8031 | Information | SmartlockerFilter detected file * being written by process * | Added in Windows Server 2016 and Windows 10.|
-| 8032 | Error | ManagedInstaller check FAILED during Appid verification of * | Added in Windows Server 2016 and Windows 10.|
-| 8033 | Warning | ManagedInstaller check FAILED during Appid verification of * . Allowed to run due to Audit AppLocker Policy. | Added in Windows Server 2016 and Windows 10.|
-| 8034 | Information | ManagedInstaller Script check FAILED during Appid verification of * | Added in Windows Server 2016 and Windows 10.|
-| 8035 | Error | ManagedInstaller Script check SUCCEEDED during Appid verification of * | Added in Windows Server 2016 and Windows 10.|
-| 8036 | Error | * was prevented from running due to Config CI policy | Added in Windows Server 2016 and Windows 10.|
-| 8037 | Information | * passed Config CI policy and was allowed to run.| Added in Windows Server 2016 and Windows 10.|
-| 8038 | Information | Publisher info: Subject: * Issuer: * Signature index * (* total) | Added in Windows Server 2016 and Windows 10.|
-| 8039 | Warning | Package family name * version * was allowed to install or update but would have been prevented if the Config CI policy | Added in Windows Server 2016 and Windows 10.|
-| 8040 | Error | Package family name * version * was prevented from installing or updating due to Config CI policy | Added in Windows Server 2016 and Windows 10.|
+| 8000 | Error | AppID policy conversion failed. Status * <%1> * | Indicates that the policy wasn't applied correctly to the computer. The status message is provided for troubleshooting purposes. |
+| 8001 | Information | The AppLocker policy was applied successfully to this computer. | Indicates that the AppLocker policy was successfully applied to the computer. |
+| 8002 | Information | *<File name> * was allowed to run. | Indicates an AppLocker rule allowed the .exe or .dll file. |
+| 8003 | Warning | *<File name> * was allowed to run but would have been prevented from running if the AppLocker policy were enforced. | Shown only when the **Audit only** enforcement mode is enabled. Indicates that the AppLocker policy would block the .exe or .dll file if the enforcement mode setting was **Enforce rules**. |
+| 8004 | Error | *<File name> * was prevented from running. | AppLocker blocked the named EXE or DLL file. Shown only when the **Enforce rules** enforcement mode is enabled. |
+| 8005| Information | *<File name> * was allowed to run. | Indicates an AppLocker rule allowed the script or .msi file. |
+| 8006 | Warning | *<File name> * was allowed to run but would have been prevented from running if the AppLocker policy were enforced. | Shown only when the **Audit only** enforcement mode is enabled. Indicates that the AppLocker policy would block the script or .msi file if the **Enforce rules** enforcement mode was enabled. |
+| 8007 | Error | *<File name> * was prevented from running. | AppLocker blocked the named Script or MSI. Shown only when the **Enforce rules** enforcement mode is enabled. |
+| 8008| Warning | *<File name> *: AppLocker component not available on this SKU. | Indicates an edition of Windows that doesn't support AppLocker. |
+| 8020| Information | *<File name> * was allowed to run. | Added in Windows Server 2012 and Windows 8. |
+| 8021| Warning | *<File name> * was allowed to run but would have been prevented from running if the AppLocker policy were enforced. | Added in Windows Server 2012 and Windows 8. |
+| 8022| Error | *<File name> * was prevented from running. | Added in Windows Server 2012 and Windows 8. |
+| 8023 | Information | *<File name> * was allowed to be installed. | Added in Windows Server 2012 and Windows 8. |
+| 8024 | Warning | *<File name> * was allowed to run but would have been prevented from running if the AppLocker policy were enforced. | Added in Windows Server 2012 and Windows 8. |
+| 8025 | Error | *<File name> * was prevented from running. | Added in Windows Server 2012 and Windows 8. |
+| 8027 | Error | No packaged apps can be executed while Exe rules are being enforced and no Packaged app rules have been configured. | Added in Windows Server 2012 and Windows 8. |
+| 8028 | Warning | *<File name> * was allowed to run but would have been prevented if the Config CI policy were enforced. | Added in Windows Server 2016 and Windows 10. |
+| 8029 | Error | *<File name> * was prevented from running due to Config CI policy. | Added in Windows Server 2016 and Windows 10. |
+| 8030 | Information | ManagedInstaller check SUCCEEDED during Appid verification of * | Added in Windows Server 2016 and Windows 10. |
+| 8031 | Information | SmartlockerFilter detected file * being written by process * | Added in Windows Server 2016 and Windows 10. |
+| 8032 | Error | ManagedInstaller check FAILED during Appid verification of * | Added in Windows Server 2016 and Windows 10. |
+| 8033 | Warning | ManagedInstaller check FAILED during Appid verification of * . Allowed to run due to Audit AppLocker Policy. | Added in Windows Server 2016 and Windows 10. |
+| 8034 | Information | ManagedInstaller Script check FAILED during Appid verification of * | Added in Windows Server 2016 and Windows 10. |
+| 8035 | Error | ManagedInstaller Script check SUCCEEDED during Appid verification of * | Added in Windows Server 2016 and Windows 10. |
+| 8036 | Error | * was prevented from running due to Config CI policy | Added in Windows Server 2016 and Windows 10. |
+| 8037 | Information | * passed Config CI policy and was allowed to run. | Added in Windows Server 2016 and Windows 10. |
+| 8038 | Information | Publisher info: Subject: * Issuer: * Signature index * (* total) | Added in Windows Server 2016 and Windows 10. |
+| 8039 | Warning | Package family name * version * was allowed to install or update but would have been prevented if the Config CI policy | Added in Windows Server 2016 and Windows 10. |
+| 8040 | Error | Package family name * version * was prevented from installing or updating due to Config CI policy | Added in Windows Server 2016 and Windows 10. |
-
## Related articles
- [Tools to use with AppLocker](tools-to-use-with-applocker.md)
From 411e328fa1a69c8655bc3260991e40c3c75d76ac Mon Sep 17 00:00:00 2001
From: jsuther1974
Date: Sun, 24 Dec 2023 10:12:55 -0800
Subject: [PATCH 7/7] Final review of AppLocker topics
---
.../applocker-policies-deployment-guide.md | 2 --
.../applocker-policies-design-guide.md | 2 +-
.../applocker-technical-reference.md | 5 ++--
...oy-the-applocker-policy-into-production.md | 2 +-
...p-policy-structure-and-rule-enforcement.md | 1 -
.../document-your-applocker-rules.md | 5 ++--
...stand-applocker-policy-design-decisions.md | 2 --
.../windows-installer-rules-in-applocker.md | 27 +++++++++----------
.../applocker/working-with-applocker-rules.md | 6 ++---
9 files changed, 21 insertions(+), 31 deletions(-)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md
index c6e633f5be..cb437f92b7 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md
@@ -21,7 +21,6 @@ The following are prerequisites or recommendations to deploying policies:
- Document your application control policy deployment plan by addressing these tasks:
- [Understand the AppLocker policy deployment process](understand-the-applocker-policy-deployment-process.md)
- [Understand AppLocker policy design decisions](understand-applocker-policy-design-decisions.md)
- - [Determine your application control objectives](determine-your-application-control-objectives.md)
- [Create list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md)
- [Select types of rules to create](select-types-of-rules-to-create.md)
- [Determine Group Policy Structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md)
@@ -33,6 +32,5 @@ The following are prerequisites or recommendations to deploying policies:
| --- | --- |
| [Understand the AppLocker policy deployment process](understand-the-applocker-policy-deployment-process.md) | This planning and deployment article for the IT professional describes the process for using AppLocker when deploying application control policies. |
| [Requirements for Deploying AppLocker Policies](requirements-for-deploying-applocker-policies.md) | This deployment article for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies. |
-| [Use Software Restriction Policies and AppLocker policies](using-software-restriction-policies-and-applocker-policies.md) | This article for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment. |
| [Create Your AppLocker policies](create-your-applocker-policies.md) | This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment. |
| [Deploy the AppLocker policy into production](deploy-the-applocker-policy-into-production.md) | This article for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings. |
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-design-guide.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-design-guide.md
index e5bcbe1663..0299b53b2a 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-design-guide.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-design-guide.md
@@ -19,7 +19,7 @@ To understand if AppLocker is the correct application control solution for your
| Article | Description |
| --- | --- |
| [Understand AppLocker policy design decisions](understand-applocker-policy-design-decisions.md) | This article describes AppLocker design questions, possible answers, and other considerations when you plan a deployment of application control policies by using AppLocker. |
-| [Determine your application control objectives](determine-your-application-control-objectives.md) | This article helps you with the decisions you need to make to determine what applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker. |
+| [Determine your application control objectives](determine-your-application-control-objectives.md) | This article helps you with the decisions you need to make to determine what applications to control and how to control them using AppLocker. |
| [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md) | This article describes the process of gathering app usage requirements from each business group in order to implement application control policies by using AppLocker. |
| [Select the types of rules to create](select-types-of-rules-to-create.md) | This article lists resources you can use when selecting your application control policy rules by using AppLocker. |
| [Determine the Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md) | This overview article describes the process to follow when you're planning to deploy AppLocker rules. |
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference.md
index 909445c4b9..0952a3d433 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference.md
@@ -15,13 +15,12 @@ AppLocker lets you create rules to allow or deny apps from running based on info
| Article | Description |
| --- | --- |
-| [What Is AppLocker?](what-is-applocker.md) | This article for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies. |
+| [What Is AppLocker?](what-is-applocker.md) | This article for the IT professional describes what AppLocker is. |
| [Requirements to use AppLocker](requirements-to-use-applocker.md) | This article for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems. |
| [AppLocker policy use scenarios](applocker-policy-use-scenarios.md) | This article for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented. |
| [How AppLocker works](how-applocker-works-techref.md) | This article for the IT professional provides links to articles about AppLocker architecture and components, processes and interactions, rules and policies. |
| [AppLocker architecture and components](applocker-architecture-and-components.md) | This article for IT professional describes AppLocker's basic architecture and its major components. |
| [AppLocker processes and interactions](applocker-processes-and-interactions.md) | This article for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules. |
-| [AppLocker functions](applocker-functions.md) | This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features. |
+| [AppLocker functions](applocker-functions.md) | This article for the IT professional lists the functions and security levels for AppLocker. |
| [Security considerations for AppLocker](security-considerations-for-applocker.md) | This article for the IT professional describes the security considerations you need to address when implementing AppLocker. |
| [Tools to Use with AppLocker](tools-to-use-with-applocker.md) | This article for the IT professional describes the tools available to create and administer AppLocker policies. |
-| [AppLocker Settings](applocker-settings.md) | This article for the IT professional lists the settings used by AppLocker. |
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md
index 38a183679a..d2ef52adad 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md
@@ -19,7 +19,7 @@ Before you deploy an AppLocker policy, you should determine:
- For each business group, which applications to control and in what manner. For more info, see [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md).
- How to handle requests for application access. For info about what to consider when developing your support policies, see [Plan for AppLocker policy management](plan-for-applocker-policy-management.md).
- How to manage events, including forwarding events. For info about event management in AppLocker, see [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md).
-- Your GPO structure, including how to include policies generated by Software Restriction Policies and AppLocker policies. For more info, see [Determine the Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md).
+- Your GPO structure, including how to include AppLocker policies. For more info, see [Determine the Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md).
For info about how AppLocker deployment is dependent on design decisions, see [Understand AppLocker policy design decisions](understand-applocker-policy-design-decisions.md).
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md
index a8e5878454..fb13e22d88 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md
@@ -21,7 +21,6 @@ This overview article describes the process to follow when you're planning to de
When determining how many Group Policy Objects (GPOs) to create for managing AppLocker policy in your organization, you should consider the following points:
- Whether you're creating new GPOs or using existing GPOs
-- Whether you're implementing Software Restriction Policies (SRP) policies and AppLocker policies in the same GPO
- GPO naming conventions
- GPO size limits
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/document-your-applocker-rules.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/document-your-applocker-rules.md
index ce02f4d772..1d5ff7d78e 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/document-your-applocker-rules.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/document-your-applocker-rules.md
@@ -10,9 +10,8 @@ ms.date: 12/22/2023
To complete this AppLocker planning document, you should first complete the following steps:
-1. [Determine your application control objectives](determine-your-application-control-objectives.md)
-2. [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md)
-3. [Select the types of rules to create](select-types-of-rules-to-create.md)
+1. [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md)
+2. [Select the types of rules to create](select-types-of-rules-to-create.md)
Document the following items for each business group or organizational unit:
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md
index 13d2116bc1..898b41da58 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md
@@ -154,5 +154,3 @@ Designing application control policies based on an organizational structure that
## Record your findings
The next step in the process is to record and analyze your answers to the preceding questions. If AppLocker is the right solution for your goals, you can set your application control policy objectives and plan your AppLocker rules. This process culminates in creating your planning document.
-
-- For info about setting your policy goals, see [Determine your application control objectives](determine-your-application-control-objectives.md).
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md
index 9f51d9f474..e64e6e97ff 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md
@@ -1,32 +1,29 @@
---
title: Windows Installer rules in AppLocker
-description: This topic describes the file formats and available default rules for the Windows Installer rule collection.
+description: This article describes the file formats and available default rules for the Windows Installer rule collection.
ms.localizationpriority: medium
ms.topic: conceptual
-ms.date: 09/21/2017
+ms.date: 12/24/2023
---
# Windows Installer rules in AppLocker
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
-
-This topic describes the file formats and available default rules for the Windows Installer rule collection.
+This article describes the file formats and available default rules for the Windows Installer rule collection.
AppLocker defines Windows Installer rules to include only the following file formats:
-- .msi
-- .msp
-- .mst
+- .msi
+- .msp
+- .mst
The purpose of this collection is to allow you to control the installation of files on client computers and servers through Group Policy or the Local Security Policy snap-in. The following table lists the default rules that are available for the Windows Installer rule collection.
| Purpose | Name | User | Rule condition type |
-| - | - | - | - |
-| Allow members of the local Administrators group to run all Windows Installer files| (Default Rule) All Windows Installer files| BUILTIN\Administrators| Path: *|
-| Allow all users to run Windows Installer files that are digitally signed | (Default Rule) All digitally signed Windows Installer files| Everyone| Publisher: * (all signed files)|
-| Allow all users to run Windows Installer files that are located in the Windows Installer folder | (Default Rule) All Windows Installer files in %systemdrive%\Windows\Installer| Everyone| Path: %windir%\Installer\*|
-
-## Related topics
+| --- | --- | --- | --- |
+| Allow members of the local Administrators group to run all Windows Installer files| (Default Rule) All Windows Installer files| BUILTIN\Administrators| Path: *|
+| Allow all users to run Windows Installer files that are digitally signed | (Default Rule) All digitally signed Windows Installer files| Everyone| Publisher: * (all signed files)|
+| Allow all users to run Windows Installer files that are located in the Windows Installer folder | (Default Rule) All Windows Installer files in %systemdrive%\Windows\Installer| Everyone| Path: %windir%\Installer\*|
+
+## Related articles
- [Understanding AppLocker default rules](understanding-applocker-default-rules.md)
diff --git a/windows/security/application-security/application-control/windows-defender-application-control/applocker/working-with-applocker-rules.md b/windows/security/application-security/application-control/windows-defender-application-control/applocker/working-with-applocker-rules.md
index fc51015576..e06ef57ede 100644
--- a/windows/security/application-security/application-control/windows-defender-application-control/applocker/working-with-applocker-rules.md
+++ b/windows/security/application-security/application-control/windows-defender-application-control/applocker/working-with-applocker-rules.md
@@ -35,10 +35,10 @@ The DLL rule collection isn't enabled by default. To learn how to enable the DLL
## Enforcement modes
-AppLocker policies set an **enforcement mode** for each rule collection included in the policy. These enforcement modes are described in the following table.
+AppLocker policies set an **enforcement mode** for each rule collection included in the policy. These enforcement modes are described in the following table.
| Enforcement mode | Description |
-| - | - |
+| --- | --- |
| **Not configured** | Despite the name, this enforcement mode **doesn't** mean the rules are ignored. On the contrary, if any rules exist in a rule collection that is "not configured", the rules **will be enforced** unless a policy with a higher precedence changes the enforcement mode to Audit only. Since this enforcement mode can be confusing for policy authors, you should avoid using this value in your AppLocker policies. Instead, you should choose explicitly between the remaining two options. |
| **Enforce rules** | Rules are enforced. When a user runs an app affected by an AppLocker rule, the app binary is blocked. Info about the binary is added to the AppLocker event log. |
| **Audit only** | Rules are audited but not enforced. When a user runs an app affected by an AppLocker rule, the app binary is allowed to run. However, the info about the binary is added to the AppLocker event log. The Audit-only enforcement mode helps you identify the apps affected by the policy before the policy is enforced. |
@@ -76,7 +76,7 @@ The **File version** and **Package version** control whether a user can run a sp
The following table describes how a publisher condition is applied.
| Option | The publisher condition allows or denies... |
-|---|---|
+| --- | --- |
| **All signed files** | All files signed by any publisher. |
| **Publisher only** | All files signed by the named publisher. |
| **Publisher and product name** | All files for the specified product signed by the named publisher. |